Downloads: 120 | Views: 298
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013 | Popularity: 6.1 / 10
Data Encryption and Decryption Process using PSR Methodology and Performance Analysis with RSA
P. Srinivasarao, B. Chaitanya, K. Venkatesh
Abstract: A day-to-day use of cryptography in our life is increasing tremendously; this is because of necessity of our multimedia documents to be protected from unauthorized person. As the days are passing the old algorithms are not remained so strong as cryptanalyst are familiar with them. Today the computers are faster and in feature its speed will increase more and more. Brute force attacks are made to break the encryption and they are growing so faster. These attacks are the main drawbacks of older algorithm. But with feature this algorithms will be replaced by new techniques that will provide better protection. In this paper we are going to proposed new encryption technique which is more faster, better immune to attacks, more complex, easy to encrypt and many more advanced security feature included. This Document displays the comparison between PSR algorithm and RSA Algorithm which are used in the encryption of plaintext into cipher text that are generally used in cryptography.
Keywords: cryptography, cryptanalyst, symmetric encryption, Authentication key, RSA
Edition: Volume 2 Issue 3, March 2013
Pages: 229 - 232
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 10, October 2021
Pages: 853 - 859A Brief Survey and Examination of Various Searching Techniques
Cherukuri Nischay Sai
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 4, April 2024
Pages: 923 - 930Robustness Testing for AI/ML Models: Strategies for Identifying and Mitigating Vulnerabilities
Praveen Kumar, Shailendra Bade