Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Study on Various Cryptographic Algorithms and their Scope and Improvement towards Future Security Needs


Affiliations
1 IFET College of Engineering, Villupuram, India
2 Assistant Professor of Computer Applications, Department in IFET College of Engineering, India
     

   Subscribe/Renew Journal


Over the years, numerous cryptographic algorithms have been developed and used in many different protocols and functions. Cryptography is by no means static. Steady advances in computing and in the science of cryptanalysis have made it necessary to adopt newer, stronger algorithms and larger key sizes. Older algorithms are supported in current products to ensure backward compatibility and interoperability. However, some older algorithms and key sizes no longer provide adequate protection from modern threats and should be replaced. This paper summarizes the security of cryptographic algorithms and parameters, gives concrete recommendations regarding which cryptography should be used and which cryptography should be replaced, and describes alternatives and mitigations.


Keywords

Cryptography, Key Sizes, Security, Protocols, Functions, Science of Cryptanalysis
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 204

PDF Views: 0




  • A Study on Various Cryptographic Algorithms and their Scope and Improvement towards Future Security Needs

Abstract Views: 204  |  PDF Views: 0

Authors

K. Gayathri
IFET College of Engineering, Villupuram, India
S. Sivachandiran
Assistant Professor of Computer Applications, Department in IFET College of Engineering, India

Abstract


Over the years, numerous cryptographic algorithms have been developed and used in many different protocols and functions. Cryptography is by no means static. Steady advances in computing and in the science of cryptanalysis have made it necessary to adopt newer, stronger algorithms and larger key sizes. Older algorithms are supported in current products to ensure backward compatibility and interoperability. However, some older algorithms and key sizes no longer provide adequate protection from modern threats and should be replaced. This paper summarizes the security of cryptographic algorithms and parameters, gives concrete recommendations regarding which cryptography should be used and which cryptography should be replaced, and describes alternatives and mitigations.


Keywords


Cryptography, Key Sizes, Security, Protocols, Functions, Science of Cryptanalysis