A Survey on Various Most Common Encryption Techniques

This talk will present a perspective on the current state of play in the field of encryption algorithms, in particular on private key block ciphers which are widely used for bulk data and link encryption. we have initially survey some of the more popular and interesting algorithms currently in use. This paper focuses mainly on the different kinds of encryption techniques that are existing, and comparative study all the techniques together as a literature survey. Aim an extensive experimental study of implementations of various available encryption techniques. Also focuses on image encryption techniques, information encryption techniques. This study extends to the performance parameters used in encryption processes and analyzing on their security issues.

[1]  Saleh Mesbah,et al.  Efficiency and Security of Some Image Encryption Algorithms , 2008 .

[2]  Matthew S. Gast,et al.  802.11 Wireless Networks: The Definitive Guide , 2002 .

[3]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[4]  J. P. Raina,et al.  Comparative Analysis of AES and RC4 Algorithms for Better Utilization , 2011 .

[5]  Mohey M. Hadhoud,et al.  Wireless Network Security Still Has no Clothes , 2011, Int. Arab. J. e Technol..

[6]  R. N. Uma,et al.  Battery power-aware encryption , 2006, TSEC.

[7]  Vincent Rijmen,et al.  Rijndael, the advanced encryption standard , 2001 .

[8]  R. Umarani,et al.  Data Security in Local Area Network Based on Fast Encryption Algorithm , 2010, CNSA.

[9]  Prashant Krishnamurthy,et al.  Analysis of energy consumption of RC4 and AES algorithms in wireless LANs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[10]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[11]  Ralph Howard,et al.  Data encryption standard , 1987 .

[12]  Mohey M. Hadhoud,et al.  Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types , 2010, Int. J. Netw. Secur..

[13]  G. Ramesh,et al.  DATA SECURITY IN LOCAL AREA NETWORK BASED ON FAST ENCRYPTION ALGORITHM , 2010 .

[14]  Mohammed Boulmalf,et al.  On the Impact of Security on the Performance of WLANs , 2007, J. Commun..

[15]  Mohey M. Hadhoud,et al.  Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..

[16]  Gurjeevan Singh,et al.  Through Put Analysis of Various Encryption Algorithms , 2011 .

[17]  R. Badlishah Ahmad,et al.  Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers , 2008 .

[18]  Rajan Mishra,et al.  Comparative Analysis Of Encryption Algorithms For Data Communication , 2011 .

[19]  Khalid Al-Zamil,et al.  Performance evaluation of three encryption/decryption algorithms , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[20]  R. Umarani,et al.  UR5:A Novel Symmetrical Encryption Algorithm With Fast Flexible and High Security Based On Key Updation , 2012 .

[21]  A. Tamimi Performance Analysis of Data Encryption Algorithms , 2006 .

[22]  P. Krishnamurthy,et al.  Encryption and Power Consumption in Wireless LANs , 2001 .

[23]  Raman Maini,et al.  COMPARISON OF DATA ENCRYPTION ALGORITHMS , 2011 .

[24]  Neeta Wadhwa,et al.  A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms , 2011 .

[25]  R. Umarani,et al.  UMARAM: A novel fast encryption algorithm for data security in local area network , 2010, 2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES.