Download PDFOpen PDF in browserComparative Analysis of Cryptographic Algorithms in Computer NetworkEasyChair Preprint 102186 pages•Date: May 21, 2023AbstractOne technique to ensure the security and privacy of the user's data as well as the secrecy, authentication, integrity, availability, and identification of the data user is through the use of cryptography. The most valuable term in the realm of communication systems nowadays is security. One of the most secure technologies for delivering data to a valid user is cryptography, which transforms regular plain text into cipher text. Security come with a variety of technologies and approaches. Regarding different parameters, we give performance and comparison. It is possible to express the encryption ratio as a minimal, moderate, or maximal value. The Visual Studio. All the results of the experiment are implemented using net packages. Based on the quantity of keys, cryptography techniques can be classified as either symmetric or asymmetric. While asymmetric algorithms employ different keys for encryption and decryption, symmetric algorithms use the same key for both operations. The most popular symmetric algorithms are Blowfish, Data Encryption Standard (DES), and Advanced Encryption Standard (AES). Elliptic Curve Cryptography, Diffie-Hellman, and RSA are examples of asymmetric algorithms (ECC). A cryptographic algorithm's key size, complexity, and attack resistance all affect how effective it is. In computer networks, cryptographic techniques are frequently used to protect data while it is in motion and at rest, such as during online transactions, mail delivery, and file storage. Keyphrases: 1.Symmetric Key Encryption, 2.Asymmetric Key Encryption, 3.Cryptanalysis
|