International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114

Comparative Studies | Computer Science & Engineering | Nigeria | Volume 4 Issue 4, April 2015


Comparative Analysis of Some Encryption Algorithms and Secured Remote Protocol

Ojekudo Nathaniel Akpofure Ph.D [2] | Nwankwe Dimie M.Sc


Abstract: The need for information assurance and security all over the world cannot be overemphasized. Attacks on security of a computer or network are generally characterized as interruption, interception, modification and fabrication. The four main security issues related to these are confidentiality, authentication, integrity and non-repudiation. Cryptography is necessary and must be applied on many network layers. The Research work intends to compare some encryption algorithms and secured remote protocol based on the four main security issues and also developed a prototype attached in the appendix.


Keywords: Cryptography, Encryption, Algorithm


Edition: Volume 4 Issue 4, April 2015,


Pages: 731 - 741


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Ojekudo Nathaniel Akpofure Ph.D, Nwankwe Dimie M.Sc, "Comparative Analysis of Some Encryption Algorithms and Secured Remote Protocol", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 731-741, https://www.ijsr.net/get_abstract.php?paper_id=SUB152919

Similar Articles with Keyword 'Cryptography'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [12] | R. Sathya [8]

Share this Article
Top