DocumentCode
2349355
Title
Comparative Study of Security Protocols to Enhance Security
Author
Prachi ; Dewan, Surbhi ; Pratibha
Author_Institution
CSE & IT Dept., ITM Univ., Gurgaon, India
fYear
2015
fDate
21-22 Feb. 2015
Firstpage
552
Lastpage
556
Abstract
Rapidly acceleration in the technological advances throughout the world leads to enormous increase in encrypted Internet traffic. Tremendous progressions and changes are taking place in months rather than in years. From mobility and video to cloud and network programmability, there is no end of vision. Majority of people still believe that computer securely sends the email to the intended recipient. However, wireless communication brings lots of security threats so transmission of plain text over the Internet is very insecure. However, email goes over the Internet completely unsecured. Striking thing is that there are nearly one billion websites all over, however only about few percent of the traffic is secured. This is a huge susceptibility and a huge possibility for growth in encrypted network traffic. This paper includes comparative study of various encryption algorithms and concludes which technique is best to deal with the problem.
Keywords
Internet; computer network security; cryptography; electronic mail; telecommunication traffic; email; encrypted Internet traffic; encrypted network traffic; security protocols; security threats; wireless communication; Algorithm design and analysis; Elliptic curve cryptography; Encryption; Internet; Protocols; AES; Ciphertext; DES; Decryption; ECC; Encryption; Plain text; RSA; SSL;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Computing & Communication Technologies (ACCT), 2015 Fifth International Conference on
Conference_Location
Haryana
Print_ISBN
978-1-4799-8487-9
Type
conf
DOI
10.1109/ACCT.2015.34
Filename
7079144
Link To Document