logo

Data Security Techniques: AES, DES and RSA Algorithms

   

Added on  2022-10-19

11 Pages2207 Words437 Views
Theoretical Computer Science
 | 
 | 
 | 
Running head: DATA SECURITY TECHNIQUES
DATA SECURITY TECHNIQUES
Name of the student:
Name of the university:
Author Note:
Data Security Techniques: AES, DES and RSA Algorithms_1

DATA SECURITY TECHNIQUES1
Table of Contents
1.0 Introduction..........................................................................................................................2
2.0 Article Analysis....................................................................................................................2
2.1 Intention and Content of the Article.................................................................................3
2.2 Discussion of Results.......................................................................................................7
2.3 Discussion of Conclusion.................................................................................................7
3.0 Conclusion............................................................................................................................8
4.0 References............................................................................................................................9
Data Security Techniques: AES, DES and RSA Algorithms_2

DATA SECURITY TECHNIQUES2
1.0 Introduction
The significant report will be associated with the important techniques associated with
the encryption of the data that are efficiently related with the security of the data. These data
are being identified in respect to the fact that they are being transmitted within the overall
network servers. The potential security of the network has been depicted to be evaluated as
the most significant criteria, which is associated with the security of the data. The sector or
technique of encryption associated with the overall data security as well as the network server
security is depicted to be the important solution in respect to the network server security
mechanisms. The main purpose of this report will be associated with the overall encryption
techniques associated with the protection of the data present within the network systems.
The report will provide a critical assessment as well as a significant analysis in respect
to the three important data encryption techniques, which are depicted as AES, DES as well as
RSA algorithms. These algorithms will provide a critical overview in the fact of the
encryption methodologies that will be helpful for the security of the data associated within
the network servers. This analysis of the significant article will provide a clear overview in
respect to the different encryption methodologies that will be associated with the potential
security of the data. The overall potential analysis of the article will be carried out in respect
to the considered article that will provide a clear overview in the stated encryption
algorithms.
2.0 Article Analysis
The article that that is considered for the critical evaluation of the different algorithms
associated with the encryption methodologies is provided below:
“P. Mahajan and A. Sachdeva, A study of encryption algorithms AES, DES and RSA for
security. Global Journal of Computer Science and Technology, 2013.”
Data Security Techniques: AES, DES and RSA Algorithms_3

DATA SECURITY TECHNIQUES3
2.1 Intention and Content of the Article
The significant article depicts that the algorithms such as AES, RSA as well as DES
that are associated with the overall encryption of the data associated within the network
server. According to Mahajan and Sachdeva (2013), it can be analysed that encryption is
identified as a significant solution in respect to the overall security of the information systems
[1] . The noteworthy transmission of the data within the network server from a sender to its
specific receiver must be potentially encrypted in respect to the security of the data.
Moreover, the knowledge of cryptography puts a significant focus in respect to the encryption
as well as decryption techniques that will be used for the enhanced security of the data thus
adhering the overall consequences in respect to the security performance of the overall data
that are being transmitted within the network security [10]. In accordance to the performance
associated with the overall encryption methodologies it can be depicted that the security of
the data. In the further means, it can be identified to provide a great deal of effective data
transmission within the overall server.
The article clearly provides an overview of the encryption algorithms that are
significantly categorized as Symmetric as well as Asymmetric encryption methodologies.
The concept of symmetric algorithms or encryption methodology is depicted to use a single
key that will be used for the security of the data in both the sender as well as receiver end [8].
Moreover, the concept of asymmetric encryption methodology is identified to use two
different keys that is depicted as public as well as private keys. These two keys are used in
both the different aspects of the sender as well as the receiver for maintaining a security of
the data that are being transmitted within the network servers [4]. The usage of the two
different keys in respect to the asymmetric encryption method is depicted to be important,
related to the security of the data. In this procedure, the public key is associated with the
encryption procedure, whereas the private key is associated with the decryption part.
Data Security Techniques: AES, DES and RSA Algorithms_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Data Encryption Techniques: AES, DES and RSA
|11
|600
|182

Data Security and Encryption: A Comprehensive Guide
|7
|2437
|212

Report on Wireless Networking Concept
|6
|1263
|64

Critical Reviewing AES and DES: A Comparative Analysis of Symmetric Block Ciphers
|16
|4394
|157

Social Phishing Assignment 2022
|10
|2080
|15

Application Security: Building in Security During the Development Stage
|9
|2231
|166