Survey on Various Cryptography Methods

Abstract

Abstract: To make secure data transmission over networks cryptography is used. The algorithm selected for cryptography should fulfil the conditions of integrity protection, conventional message authentication and digital signatures. Key exchange algorithms, hash functions, PN numbers are used for encryption and decryption of data. This encryption can be applied on data in stream format or in blocks. Moreover the length of key is the biggest constraint in encryption. Here in our paper we have studied present algorithms currently used for encryption

    Similar works

    Full text

    thumbnail-image

    Available Versions