Cryptographic Techniques on Network Security

Authors

  • Dhruti Patel UG Student, Department of Computer Science and Engineering, Devang Patel Institute of Advance Technology and Research, Charotar University of Science and Technology, Changa, India
  • Darsh Patel UG Student, Department of Computer Science and Engineering, Devang Patel Institute of Advance Technology and Research, Charotar University of Science and Technology, Changa, India
  • Vatsal Patel UG Student, Department of Computer Science and Engineering, Devang Patel Institute of Advance Technology and Research, Charotar University of Science and Technology, Changa, India
  • Amit Ganatra Principal, Devang Patel Institute of Advance Technology and Research, Charotar University of Science and Technology, Changa, India

Keywords:

encryption, cipher, symmetric algorithms, asymmetric algorithms, information security

Abstract

In modern world with the advance of technology, Information Security becomes a top priority for everybody who uses the internet. The data security in that it can be linked safely and quickly across the internet via digital file transmission. Encryption is the process of transforming plain information into decrypted material that is difficult for unintended receivers to decipher. To secure data, a variety of encryption algorithms are accessible, each with different degrees of intensity, performance, and consumption of resources. Thus, selecting the appropriate algorithm for specific application is challenging task. This paper is a study review of some symmetric and asymmetric cryptographic techniques.

Downloads

Download data is not yet available.

Downloads

Published

28-11-2021

Issue

Section

Articles

How to Cite

[1]
D. Patel, D. Patel, V. Patel, and A. Ganatra, “Cryptographic Techniques on Network Security”, IJRESM, vol. 4, no. 11, pp. 144–149, Nov. 2021, Accessed: Apr. 26, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/1543