Abstract

A huge amount of data has been generated every day across the world by organizations with the emergence of the World Wide Web, social networks, along with e-commerce applications. To safeguard the network along with data transmission that occurs over a wireless network, cryptography along with network security (NS) is utilized. In data transmission over a wireless untrustworthy network, securing data is a major concern. Providing security to the wireless sensor networks is highly significant; NS provides security not only to the end system but also to all over the network system. Consequently, NS, cryptography, present progress in NS, linear cryptanalysis (LC), together with differential cryptanalysis (DC) are explicated in this work. The outcomes of the encryption time (ET) versus file size for data encryption standard (DES), advanced encryption standard (AES), 3DES, Rivest-Shamir-Adleman (RSA), blowfish, and the decryption time (DT) versus file size for RSA, AES, modified RSA (MRSA), and nth degree truncated polynomial ring units (NTRU) are also evaluated in this paper.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call