Abstract

Information security is extremely important in terms of maintaining the security of information (text, image, audio, video) and its confidentiality, and as a result of the massive expansion in the field of technology and communications, and the emergence of the role of the internet, and for rapid communication in the transmission of this information (text, image, audio, video) There was a need to secure this information from penetration and make it incomprehensible to people who are not authorized to access this information (text, image, audio, video). Where many algorithms and techniques have appeared to protect this information, namely: Cryptography algorithms, and Steganography techniques. Cryptography is one of the techniques of information security, which studies the secure communication between the sender and receiver of the message, which is the process of converting plain text into cipher text through the use of mathematical operations. In our research paper, a comparative study and analysis of symmetric key and key asymmetric encryption algorithms in terms of effectiveness, key size, time, complexity, functionality, attacks, and research on the most prominent recent technologies such as AES, BLOWFISH, RC2, RC4, CAST, SERPENT, TEA, E-DES, RSA, DIFFIE HELLMAN, and DSA are the safest. Compared to other technologies, faster encryption time, security, speed, and flexibility according to the results

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.