Analysis of Cryptography Techniques Across Physical and Virtual Environments
Avva Mounika Gayathri1, R.Senthil Kumar2, J. Sibi Cyntya3, K. Siri Chandana4

1Avva Mounika Gayathri, UG Scholar, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai (Tamil Nadu), India.
2R. Senthil Kumar, Assistant Professor, Faculty of Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai (Tamil Nadu), India.
3J. Sibi Cyntya, Assistant Professor, Faculty of Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai (Tamil Nadu), India.
4K. Siri Chandana, UG Scholar, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai (Tamil Nadu), India.
Manuscript received on 26 April 2019 | Revised Manuscript received on 08 May 2019 | Manuscript Published on 17 May 2019 | PP: 459-462 | Volume-7 Issue-6S4 April 2019 | Retrieval Number: F10940476S419/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cryptography guarantees comfortable correspondence and knowledge protection, moreover it ensures expertise classification, validation, uprightness, accessibility and recognizable proof of patron know-how may also be kept up simply as safety and protection of knowledge can be given to the client. Nowadays, numerous cryptographic techniques are accessible. Alternative of cryptographic approach is reliant on desired quality traits, for example, effectiveness and protection. The proposed work covers the investigation of cryptographic methods, for illustration, AES, DES and blowfish calculation. The parameters, for illustration, encryption/unscrambling time, key age time and report measure are examined within the proposed work. Proposed framework disentangles making a choice on option between these three calculation elegant on the applying nature and parameter’s adequacy. The near consequences of AES, DES and blowfish calculations are regarded Key.
Keywords: Cryptography, Information Security, AES, DES, Blowfish, Encryption.
Scope of the Article: Virtual Reality