CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Comparison among different Cryptographic Algorithms using Neighborhood-Generated Keys

by Lalit Singh, R. K. Bharti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 5
Year of Publication: 2013
Authors: Lalit Singh, R. K. Bharti
10.5120/12741-9635

Lalit Singh, R. K. Bharti . Comparison among different Cryptographic Algorithms using Neighborhood-Generated Keys. International Journal of Computer Applications. 73, 5 ( July 2013), 40-43. DOI=10.5120/12741-9635

@article{ 10.5120/12741-9635,
author = { Lalit Singh, R. K. Bharti },
title = { Comparison among different Cryptographic Algorithms using Neighborhood-Generated Keys },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 5 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 40-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number5/12741-9635/ },
doi = { 10.5120/12741-9635 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:39:19.288427+05:30
%A Lalit Singh
%A R. K. Bharti
%T Comparison among different Cryptographic Algorithms using Neighborhood-Generated Keys
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 5
%P 40-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The prevention of information from unauthorized access is the main concern in the area of cryptography. There are various algorithms i. e. Elgamal, RSA, diffie Hellman, Knapsack are proposed with varying key length and key management methods. The size of encrypted message, key management method and algorithm efficiency is critical in respect of implementation in organizations that store large volumes of data. This paper proposes the comparison among various algorithms for different cryptography algorithms used in generating the neighborhood keys.

References
  1. Samuel King Opoku "A ROBUST CRYPTOGRAPHIC SYSTEM USING NEIGHBORHOOD-GENERATED KEYS" International Journal of Research in Computer Science EISSN 2249-8265 Volume 2 Issue 5 (2012) pp. 1-9.
  2. Vishwa gupta, Gajendra Singh and Ravindra Gupta, " Advance cryptography algorithm for improving data security" ijarcsse Volume 2, Issue 1, January 2012.
  3. Vashitva Kumar Srivastava , Amitesh Kumar Srivastava, and Majhar Khan, " A Symmetric Key Cryptographic Algorithm" International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 8, October – 2012.
  4. Prof K. Govinda , Dr. E. Sathiyamoorth " Multilevel Cryptography Technique Using Graceful Codes" Journal of Global Research in Computer Science Volume 2, No. 7, July 2011
  5. B. Persis Urbana Ivy, Purshotam Mandiwa. Mukesh Kumarv"A modified RSA cryptosystem based on 'n' prime numbers" International Journal of Engineering and Computer Science ISSN: 2319-7242 Volume1 Issue 2 Nov 2012 Page No. 63-66.
  6. M. V. Siva Prasad , Dr. A. Vinaya Babu & G. Satyanarayana "AN ENHANCED AND SECURE PROTOCOL FOR AUTHENTICATED KEY EXCHANGE " Journal of Theoretical and Applied Information Technology.
  7. Makhamisa Senekane, Sehlabaka Qhobosheane and B. M. Taele "Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze" IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 6, June 2011
  8. Mustafa DÜLGERLER & M. Nusret SARISAKAL " A SECURE E-MAI APPLICATION USING THE ELGAMAL ALGORITHM: MD MESSAGE CONTROLLER" journal of electrical & electronics engineering year 2003 volume 3 number 1
  9. L. Thulasimani & M. Madheswaran "Implementation of an Energy Efficient Reconfigurable Authentication Unit for Software Radio" International Journal on Computer Science and Engineering Vol. 02, No. 04, 2010, 1375-1380.
  10. A. Brillia, D. Jagadiswary, R. Muthu Venkata Krishnan"Implementing Cryptographic Techniques in Message Passing Interface Systems" International Journal of Science and Modern Engineering (IJISME) ISSN: 2319-6386, Volume-1, Issue-4, March 2013.
  11. Thanuja R & Dilip Kumar S "A NEW APPROACH TO DIFFIE-HELLMAN KEY EXCHANGE ALGORITHM" International Journal of Engineering Research and Applications (IJERA) Vol. 1, Issue 3, pp. 534-535
  12. Rashmi singh, shiv kumar " Elgamal's Algorithm in Cryptography" International Journal of Scientific & Engineering Research Volume 3, Issue 12, December-2012
  13. Mehdi Hojabri & Mona Heidari Department of CS and SE Andhra University "Union of RSA algorithm, Digital signature And KERBEROS in cloud security" International Conference on Software Technology and Computer Engineering (STACE-2012), ISBN : 978-93-81693-68-1, 22nd July 2012,Vijayawada.
  14. M. Renukadevi, N. Bhaskar, R. Prabu "ANOMALY PROTECTION USING BATCHING STRATEGIES" Journal of Computer Applications (JCA)ISSN: 0974-1925, Volume IV, Issue 4, 2011.
  15. Sonal Sharma, Jitendra singh yadav and Prashant Sharma "Modified RSA Public Key Cryptosystem Using Short Range Natural Number Algorithm" International Journal of Advanced Research in Computer Science and Software Engineering 2 (8), Volume 2, Issue 8, August- 2012, pp. 134-138.
  16. Robert M. Nauss "An Efficient Algorithm for the 0-1 Knapsack Problem" Management Science September 1976 vol. 23 no. 1 27-31http://mansci. journal. informs. org/content/23/1/27. full. pdf+html
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography neighborhood keys Elgamal diffie Hellman RSA Knapsack Security key management