Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A Survey Paper on ASCII-Based Cryptographic Techniques
Author(s):
1. Abid Sultan: School of Software, Dalian University of Technology, China.
2. Yao Lin: School of Software, Dalian University of Technology, China.
3. Azhar Mushtaq: Deparment of CS&IT University of Sargodha, Pakistan
Abstract:
With the passage of time networking field has become much more advanced. Because of this advancement, the communicating parties don't want to rely on the third party for communication because a third party may misuse or share their personal information with someone else. That’s why there is a need for such a method at which we can rely on secure communication. In recent years a lot of cryptographic techniques based on ASCII values have been proposed, but selecting an efficient and effective technique from them is a big task. In this paper, we have made a comparison among several techniques based on certain parameters to find out the best one for the ease of the users.
Page(s): 1087-1098
Published: Journal: International Journal of Innovations in Science & Technology, Volume: 4, Issue: 4, Year: 2022
Keywords:
Encryption , Symmetric , Decryption , Asymmetric , MemoryConsumption and Complexity
References:
References are not available for this document.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

6

Views