Comparative Analysis of Some Encryption Algorithms and Secured Remote Protocol

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4

Abstract

"The need for information assurance and security all over the world cannot be overemphasized. Attacks on security of a computer or network are generally characterized as interruption, interception, modification and fabrication. The four main security issues related to these are confidentiality, authentication, integrity and non-repudiation. Cryptography is necessary and must be applied on many network layers. The Research work intends to compare some encryption algorithms and secured remote protocol based on the four main security issues and also developed a prototype attached in the appendix. "

Authors and Affiliations

Keywords

Related Articles

Allelopathic Activity of Leguminosae Plants

The present study was conducted to investigate the allelopathic effects of stems of aqueous extracts of Pithecellobium dulce (Roxb.) Benth and stems of Bauhinia racemosa Lam at different concentration ( 0, 25, 50, 75 and...

Evaluation of the Effect of Previous Cultural of Sugar Beet on the Viral Inoculum Load of “Beet Necrotic Yellow Vein Virus” in Morocco

This study aimed to evaluate the effect of previous crop of sugar beet on the viral inoculums load -Beet Necrotic Yellow Vein Virus- (BNYVV). In Morocco wheat, corn, sesame and alfalfa are used in rotation with sugar bee...

Probiotics: A Review of Natural Way of Treating Periodontal Diseases

Probiotics, which are defined as live microbes that confer health benefits to a host when consumed in sufficient quantities, may offer a low-risk, easy-to-use treatment option for periodontal diseases. They are a heterog...

A Study on 360-Degree Feedback In Educational University With Reference To Bhubaneswar, Odisha, India

Abstract: Managers and leaders within organizations use 360-degree feedback surveys to get a better understanding of their strengths and weaknesses. The 360-degree feedback system automatically tabulates the results and...

A Review of Safety Procedures and Guide Lines in Manufacturing Workshop

A Review of Safety Procedures and Guide Lines in Manufacturing Workshop

Download PDF file
  • EP ID EP363940
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

(2015). Comparative Analysis of Some Encryption Algorithms and Secured Remote Protocol. International Journal of Science and Research (IJSR), 4(4), -. https://europub.co.uk./articles/-A-363940