Author(s):
1. Abid Sultan:
School of Software, Dalian University of Technology, China.
2. Yao Lin:
School of Software, Dalian University of Technology, China.
3. Azhar Mushtaq:
Deparment of CS&IT University of Sargodha, Pakistan
Abstract:
With the passage of time networking field has become much more advanced. Because of this advancement, the communicating parties don't want to rely on the third party for communication because a third party may misuse or share their personal information with someone else. That’s why there is a need for such a method at which we can rely on secure communication. In recent years a lot of cryptographic techniques based on ASCII values have been proposed, but selecting an efficient and effective technique from them is a big task. In this paper, we have made a comparison among several techniques based on certain parameters to find out the best one for the ease of the users.
Page(s):
1087-1098
Published:
Journal: International Journal of Innovations in Science & Technology, Volume: 4, Issue: 4, Year: 2022
Keywords:
Encryption
,
Symmetric
,
Decryption
,
Asymmetric
,
MemoryConsumption and Complexity
References:
References are not available for this document.
Citations
Citations are not available for this document.