Loading

Algorithms Used in Cryptography and Role of Cryptography in Network Security
Arun Murugesan1, Pradeep Kandhasamy Jawahar2, Karuppaiah Parameswaran3

1Mr. Arun Murugesan, Department of Computer Applications, Kalasalingam Academy of Research and Education College, Krishnankoil (Tamil Nadu), India.
2Mr. Pradeep Kandhasamy Jawahar, Department of Computer Applications, Kalasalingam Academy of Research and Education College, Krishnankoil (Tamil Nadu), India.
3Mr. Karuppaiah Parameswaran, HCL Technologies, Madurai (Tamil Nadu), India.
Manuscript received on 01 December 2019 | Revised Manuscript received on 19 December 2019 | Manuscript Published on 31 December 2019 | PP: 594-596 | Volume-8 Issue-4S2 December 2019 | Retrieval Number: D11191284S219/2019©BEIESP | DOI: 10.35940/ijrte.D1119.1284S219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this modern world, we cannot live without these two things. One is technology and other one is security. Even these two cannot stand alone, they depend on each other. Technology without security and security without technology leads the world into destroying path. Day by day the technology is improving and also the security. In the technology field, the network plays an important role. Every system in the world depends on the network. So the network has been secured before it sends to the relevant people. By this problem can lead us to create a new method called Cryptography. The work of cryptography is to convert the sending message into encryption method by using some key and the receiver receives the encrypted message. The receiver decrypt the message by the key which is used to encrypt the message. In this paper, we discuss how network security works with cryptography and algorithm used for cryptography.
Keywords: Cryptography, DES, Encryption, Decryption, AES, Blowfish.
Scope of the Article: Network Security Trust, & Privacy