Cryptography with High Throughput : A survey

  • Unique Paper ID: 143298
  • Volume: 2
  • Issue: 10
  • PageNo: 1-7
  • Abstract:
  • Cryptography is primary requirement in any type of area. Cryptography is used for secure the data and communication between two parties. Some organization may have large set of data and some may have small set of data. Sometimes large data needs low security and small data needs high security. For that purpose various symmetric and asymmetric algorithms are used like DES, 3DES, AES, BLOWFISH, IDEA, RSA. In this research algorithms are used for encryption and decryption and measure the performance and throughput according to speed, time, memory. In these all algorithms some arithmetic and logical operations are performed.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{143298,
        author = {Bhoomika Modi and Vinitkumar Gupta},
        title = {Cryptography with High Throughput : A survey},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {2},
        number = {10},
        pages = {1-7},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=143298},
        abstract = {Cryptography is primary requirement in any type of area. Cryptography is used for secure the data and communication between two parties. Some organization may have large set of data and some may have small set of data. Sometimes large data needs low security and small data needs high security. For that purpose various symmetric and asymmetric algorithms are used like DES, 3DES, AES, BLOWFISH, IDEA, RSA. In this research algorithms are used for encryption and decryption and measure the performance and throughput according to speed, time, memory. In these all algorithms some arithmetic and  logical operations are performed.},
        keywords = {Cryptography, Encryption, Decryption, Security, DES, Blowfish, 3DES, AES.},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 2
  • Issue: 10
  • PageNo: 1-7

Cryptography with High Throughput : A survey

Related Articles