International Conference on Communication, Computing and Information Technology |
Foundation of Computer Science USA |
ICCCMIT2014 - Number 3 |
March 2015 |
Authors: K.b. Priya Iyer, R. Anusha, R. Shakthi Priya |
f9f955e3-0b2e-4101-89bc-0ef8b2ec7c9f |
K.b. Priya Iyer, R. Anusha, R. Shakthi Priya . Comparitive Study on Various Cryptographic Techniques. International Conference on Communication, Computing and Information Technology. ICCCMIT2014, 3 (March 2015), 37-42.
In today's world of internet technology that covers especially communication network security is a challenging issue. Hackers try to gain control over our system and steel data from it. To avoid this providing network security is an important task. Cryptography along with its various methods is used to serve this purpose. Cryptography is a technique to protect message by transforming it into an unreadable format called cipher text. It provides authentication, identification to user data, confidentiality and also provides security and privacy to the data stored. The main objective of this paper is to study the basic terms used in cryptography its purpose and to compare the encryption techniques used in cryptography.