A COMPETITIVE ANALYSIS OF CRYPTOGRAPHY TECHNIQUES OVER BLOCK CIPHER
Abstract
The complication of cryptography does not allow many people to actually understand the motivations of working security cryptography. Cryptography process seeks to distribute an estimation of basic cryptographic primitives across a number of unions in order to reduce security assumptions on individual nodes, which establish a level of fault-tolerance contrasting to the node modification. In an increasingly networked and distributed communications setting, there are more and more useful situations where the ability to distribute a computation between a number of dissimilar network intersections is needed. The reason back to the efficiency, fault-tolerance and security that order differently. Hence, this work aims to describe and review the different research that has done toward text encryption and description in the block cipher. Moreover, the proposed method suggests a cryptography model in the block cipher.Downloads
Published
Issue
Section
License
COPYRIGHT AGREEMENT AND AUTHORSHIP RESPONSIBILITY
 All paper submissions must carry the following duly signed by all the authors:
“I certify that I have participated sufficiently in the conception and design of this work and the analysis of the data (wherever applicable), as well as the writing of the manuscript, to take public responsibility for it. I believe the manuscript represents valid work. I have reviewed the final version of the manuscript and approve it for publication. Neither has the manuscript nor one with substantially similar content under my authorship been published nor is being considered for publication elsewhere, except as described in an attachment. Furthermore I attest that I shall produce the data upon which the manuscript is based for examination by the editors or their assignees, if requested.â€