Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7356
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sood, Payal | - |
dc.contributor.author | Singh, Amit Kumar [Guided by] | - |
dc.date.accessioned | 2022-10-07T06:57:59Z | - |
dc.date.available | 2022-10-07T06:57:59Z | - |
dc.date.issued | 2016 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7356 | - |
dc.description.abstract | Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. However, in today's computer-centric world, cryptography is most often associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext) into ciphertext (a process called encryption), then back again (known as decryption). Individuals who practice this field are known as cryptographers. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Cryptographic algorithms | en_US |
dc.title | Implementation and Performance Analysis of Different Symmetric Cryptographic Algorithms | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Implementation and Performance Analysis of Different Symmetric Cryptographic Algorithms.pdf | 2.15 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.