Academic Journals Database
Disseminating quality controlled scientific knowledge

Checking EABC performance in comparison others cryptography algorithms

ADD TO MY LIST
 
Author(s): Hamid Mehdi

Journal: International Journal of Computer Science and Network Solutions
ISSN 2345-3397

Volume: 1;
Issue: 1;
Start page: 51;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Execution time | CPU Utilization | Throughput of encrypting/decrypting | EABC

ABSTRACT
Nowadays, selecting algorithm to encryption data is very important considering attacks are varied andaccording to there are many encryption algorithms to protect information. Therefore choosing one algorithmis hard among many algorithms. Data confidentiality is one of the most important functions of encryptionalgorithms, it means when the transferring data between different systems is vague for unauthorized systemsor people. Moreover, Encryption algorithms must maintain data integrity and provide availability forinformation. New encryption methods cause the attackers cannot simply access to the information and do notallow discovering the relationship between information and the encrypted one. Therefore, availability can bedifficult for them. Existing complexities make their longevity and effectiveness increase. In This Article, Ithas been tried to check EABC performance considering execution time, CPU Utilization, Throughput ofencrypting/decrypting database.
Affiliate Program      Why do you need a reservation system?