Loading

Survey on Cryptography Algorithms
Brijesh Kumar Patel1, Mukti Pathak2

1Brijesh Kumar Patel, 3rdSem M.E, Department of Computer Engineering, Hasmukh Goswami College of Engineering, Vehlal, Ahmedabad (U.P), India.
2Mukti Pathak, Assistant Professor, Department of Computer Engineering, Hasmukh Goswami College of Engineering, Vehlal, Ahmedabad (U.P), India.
Manuscript received on 10 December 2014 | Revised Manuscript received on 20 December 2014 | Manuscript Published on 30 December 2014 | PP: 43-46 | Volume-4 Issue-7, December 2014 | Retrieval Number: G1892124714/14©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cryptography is that discover and study of methods and procedures for secure communication within the existence of third parties. There is a great number of techniques used in order to achieve the integrity, availability and data protection to secure information. This paper will present a viewpoint on the current state of play in the field of cryptography algorithms. Cryptography offers a lot of techniques which nowadays are difficult to fail. In this paper, we want to prove competency of different techniques by comparing the different types of crypto algorithms like DES, TDES, AES, Blowfish, PGP , RSA and also by presenting their weaknesses and strengths.
Keywords: Cryptography, AES, DES, TDES, Blowfish, PGP, RSA.

Scope of the Article: Web Algorithms