Audio Encryption with AES and Blowfish
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 11
Abstract
With the rapid growth of information and communication industry, data transfer, communication of information, storing of data in cloud, sharing of valuable information across networks, raised the need of security of data. With the technological advancements data transfer is not confined only between computers/laptops they are now with the hand held devices like mobiles/tabs. So along with data security, speed and power consumption will also need attention. For secure communication over networks Cryptography is the proven tool. The rapid growth of digital data and its security raises the concern for developing more advanced techniques in cryptography. Cryptography is the physical process that scrambles the information by rearrangement and substitution of content, making it unreadable to anyone except the person capable of unscrambling it. Algorithms are there for different data types like text, image, audio, video etc. Throughputs, Speed, CPU time, Power Consumption and security are few parameters on which cryptographic algorithms are analyzed. The present paper analyses some common symmetric cryptographic algorithms like DES, 3DES, AES, and Blowfish on the above parameters. This paper provides a comparative analysis of the existing cryptographic techniques. Further an in-depth study of Blowfish algorithm and latest work done on it are also discussed.
Authors and Affiliations
Rashmi A. Gandhi, Atul M. Gosai
Knowledge Discovery Tutor System: A Recommendation Process
Now a days web based learning environments has become very popular and efficient. By using these learning strategies, e-learning plays a vital role. “The semantic recommendation in programming language :A web mining con...
Design of Ear-Bud Model USB Flash Drive
all the electronic pen-drives are available today are new trendy model and a new verities designs. All the USB user needs a new model of pen-drive is to keep to maintain a stylish design. Now we are introducing a new de...
Applications of Data Mining Techniques In Health Insurance
Data mining is used to extract patterns in a huge data set. The hidden information can easily be fetched out using the different techniques of data mining. Market Basket Analysis is such a widely used technique which is...
An Algorithm for Association Rules Mining using Apriori based on Genetic Algorithm
Presently Apriori algorithm plays an essential role in deriving frequent itemsets and then extracting association rules out of it. It is one of the classical algorithms for finding association rules, and is widely used...
Design and Verification of ACK / NAK Protocol of PCI Express Data Link Layer in System Verilog
PCI-Express is a high performance, general purpose I/O interconnect communication protocol for multiplexing various peripheral. PCI Express is third generation Computer Bus(3GIO) to inter connect peripherals in a Comput...