UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 9 Issue 6
June-2022
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2206588


Registration ID:
404547

Page Number

f694-f697

Share This Article


Jetir RMS

Title

Comparative analysis using cryptographic algorithms for securing data

Abstract

In the word of internet in every second huge amount of data being generated every day on the internet. Securing information from hackers and providing security is a biggest challenge. To solve this problem, we have used cryptographic algorithms. Cryptography is very useful to ensure privacy and information security for making internet a safer place. Despite the numerous cryptographic algorithms being implemented in our world today, we still encounter issues of their usage. While some are very efficient in communication across networks, others are better in the file encryption such as images, text files etc. This security concern can be solved using various ways the most commonly used techniques are cryptography and steganography. But sometimes a single technique or algorithm alone cannot provide high-level security. So, we have introduced a new security mechanism that uses a combination of multiple cryptographic algorithms where three algorithms are combined together to make strong bond in securing the data along with that we have also compared the algorithms to check the best level of security in faster time. These three algorithms generate symmetric key and inbuilt steganography for securing the data. The three cryptographic algorithms are, AES (Advanced Encryption Standard), 3DES (Triple Data Encryption Standard), CAST (Carlisle Adams and Stafford Tavares) algorithms. The result of three algorithms provides strongest security with less time of encryption and decryption. All the algorithms use 128-bit keys. Comparing all the three algorithms for best performance and high-quality result.

Key Words

AES, 3DES, CAST, LSB Steganography

Cite This Article

"Comparative analysis using cryptographic algorithms for securing data", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.9, Issue 6, page no.f694-f697, June-2022, Available :http://www.jetir.org/papers/JETIR2206588.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Comparative analysis using cryptographic algorithms for securing data", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.9, Issue 6, page no. ppf694-f697, June-2022, Available at : http://www.jetir.org/papers/JETIR2206588.pdf

Publication Details

Published Paper ID: JETIR2206588
Registration ID: 404547
Published In: Volume 9 | Issue 6 | Year June-2022
DOI (Digital Object Identifier):
Page No: f694-f697
Country: Hyderabad, Telangana, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000189

Print This Page

Current Call For Paper

Jetir RMS