2023
DOI: 10.33103/uot.ijccce.23.3.11
|View full text |Cite
|
Sign up to set email alerts
|

In-Depth Assessment of Cryptographic Algorithms Namely DES, 3DES, AES, RSA, and Blowfish

Abstract: Securing information is difficult in the modern internet era, as terabytes of data are generated daily online and online transactions occur virtually every second. The current world's information security relies heavily on cryptography, which makes the internet a safer environment. Making information incoherent to an unauthorized person is done through the use of cryptography. Providing legitimate users with confidentiality as a result. There are a wide variety of cryptographic algorithms suitable for this pur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 13 publications
0
0
0
Order By: Relevance