COMPARATIVE STUDY OF DIFFERENT AUTHENTICATION AND IDENTIFICATION ALGORITHMS IN SECURED CRYPTOGRAPHY

Abstract

 The paper presents comparative study of different authentication and identification algorithms used in secured cryptography. The network security is also a great issue, when the data transfer is taken place over the internet. There are different algorithms available to provide network security like AES, DES, Triple DES, Triple AES, Kasumi, Blowfish, RSA, RC4, XMODES and TACIT. The research can be focused on the integration of network security, authentication, and multiplexing and data communication for a particular network. The wireless communications & technologies coming to homes and offices, demanding to have secure data transmission is of utmost importance. It is very much important that information is sent confidentially, over the network without the fear of hackers or unauthorized access to it. This makes security implementation in networks a crucial demand. Symmetric Encryption Cores provide data protection via the use of secret key only known to the encryption and decryption ends of the communication path. In the paper, study is carried out on the different security algorithms.

Authors and Affiliations

Keywords

Related Articles

DC BLOWER MOTOR OPERATED COOLER WITH SOLAR PANEL

cooler with solar panel for residential Cooling is very important during the summer as well as in the life to maintain the food, fish, and many items at constant temperature to avoid the bad effect of viruses’. But air c...

BIOREMEDIATION OF LOW GRADE ORES

The research work presented in this paper is on a Bioremediation for the recovery of zinc from mining waste i.e. Low grade ore of Hindustan Zinc Limited. They are waste product for the mines, as the recovery process is...

 A SURVEY PAPER ON HUMAN GAIT RECOGNITION USING PCA & NEURAL NETWORK

 In today’s world, there is a growing need to authenticate and identify individuals automatically. The securing personal privacy and deterring identity theft are national priority. The biometrics is a technology th...

 An Efficient Image Fusion Method For Fusion of Low Resolution Infrared And

 Due to the fast development of digital image processing the growth of feature extraction of images which leads to the development of image fusion. The process of co retaining salient features from each image with...

 Computer Aided Detection of Ischemic Stroke Using Verilog HDL

 Computed tomography (CT) images are widely used in the diagnosis of ischemic stroke because of its faster acquisition and compatibility with most life support devices. In present work we proposal advance technique...

Download PDF file
  • EP ID EP100238
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

(2015).  COMPARATIVE STUDY OF DIFFERENT AUTHENTICATION AND IDENTIFICATION ALGORITHMS IN SECURED CRYPTOGRAPHY. International Journal of Engineering Sciences & Research Technology, 4(1), 221-228. https://www.europub.co.uk/articles/-A-100238