Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{143298, author = {Bhoomika Modi and Vinitkumar Gupta}, title = {Cryptography with High Throughput : A survey}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {2}, number = {10}, pages = {1-7}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=143298}, abstract = {Cryptography is primary requirement in any type of area. Cryptography is used for secure the data and communication between two parties. Some organization may have large set of data and some may have small set of data. Sometimes large data needs low security and small data needs high security. For that purpose various symmetric and asymmetric algorithms are used like DES, 3DES, AES, BLOWFISH, IDEA, RSA. In this research algorithms are used for encryption and decryption and measure the performance and throughput according to speed, time, memory. In these all algorithms some arithmetic and logical operations are performed.}, keywords = {Cryptography, Encryption, Decryption, Security, DES, Blowfish, 3DES, AES.}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry