1 research outputs found

    Survey on Various Cryptography Methods

    No full text
    Abstract: To make secure data transmission over networks cryptography is used. The algorithm selected for cryptography should fulfil the conditions of integrity protection, conventional message authentication and digital signatures. Key exchange algorithms, hash functions, PN numbers are used for encryption and decryption of data. This encryption can be applied on data in stream format or in blocks. Moreover the length of key is the biggest constraint in encryption. Here in our paper we have studied present algorithms currently used for encryption
    corecore