Flash News
Welcome to IARC

Publisher Login

Latest News
Welcome to IARC- JCR Report

Submit your Journal to get IARC-JCRR Indexing and Impact Factor
 

Impact Factor calculated by IARC on the basis of Journal Citation Reference (JCR) Report.

 

Contact: iarcdpi@gmail.com

 

A Survey on Different Cryptographic Techniques
Mathew L R

Published in: International Journal of Computer Sciences and Engineering
Volume- 5, Issue-2, pp.27-29, Feb 2017
DPI :-> 16.10022.IJCSE.2017.V5I2.2729.1245



Abstract
Data transmission over the Internet for various purposes has become a necessary part of technology nowadays. But, the data sent over the Internet or the data to be retrieved can be hacked by any other party in several ways. To provide security, various cryptographic schemes have been developed. Among the different schemes the data integrity cannot be ensured in a number of aspects. Cryptography ensures that the message should be sent without any alternation and only the authorized person can be able to open and read the message. Cryptographic techniques can be broadly classified into two methods, namely symmetric and asymmetric. This paper focus mainly on the different kinds of the existing encryption techniques, and a comparative study of different algorithms.

Key-Words / Index Term
Encryption, Cryptography, Symmetric, Asymmetric

How to cite this article
Mathew L R , “ A Survey on Different Cryptographic Techniques ”, International Journal of Computer Sciences and Engineering, 5, Issue-2, pp.27-29, Feb 2017. DPI:16.10022.IJCSE.V5.I2.1245