References
[1]. Abood, O. G., & Guirguis, S. K. (2018). A survey on cryptography algorithms. International Journal of
Scientific and Research Publications, 8(7), 495-516.
http://dx.doi.org/10.29322/IJSRP.8.7.2018.p7978
[2]. Amalraj, A. J., & Jose, J. J. R. (2016). A survey paper on
cryptography techniques. International Journal of
Computer Science and mobile computing, 5(8), 55-59.
[3]. Dewangan, P. (2020). A review paper on network
security and cryptography. International Journal of
Science and Research (IJSR), 9(1).
[4]. Jeevalatha, E., & Murugan, S. S. (2018). Evolution of
AES, blowfish and twofish encr yption algorithm.
International Journal of Scientific & Engineering Research,
9(4), 115-118.
[5]. Kahate, A. (2008). Cryptography and Network
Security, Tata McGraw-Hill Companies.
[6]. Khan, M., Hussain, S., & Imran, M. (2013).
Performance evaluation of symmetric cryptography
algorithms: A survey. International Journal of Information
Technology and Electrical Engineering, 2(2), 1-8.
[7]. Koko, S. O. F. M., & Babiker, A. (2015). Comparison of
Various Encryption Algorithms and Techniques for
improving secured data Communication. IOSR Journal
of Computer Engineering (IOSR-JCE), 17(1), 62-69.
https:// doi.org/10.9790/0661-17136269
[8]. Kumari, S. (2017). A research paper on cryptography
encryption and compression techniques. International
Journal of Engineering and Computer Science, 6(4),
20915-20919.
[9]. Mandal, A. K., Parakash, C., & Tiwari, A. (2012).
Performance evaluation of cryptographic algorithms: DES and AES. In 2012, IEEE Students' Conference on
Electrical, Electronics and Computer Science, 1-5.
https://doi.org/10.1109/SCEECS.2012.6184991
[10]. Princy, P. (2015). A comparison of symmetric key
algorithms DES, AES, Blowfish, RC4, RC6: A survey.
International Journal of Computer Science &
Engineering Technology (IJCSET), 6(5), 328-331
[11]. Sivakumar, R., Balakumar, B., & Pandeeswaran, V. A.
(2018). A study of encryption algorithms (DES, 3DES and
AES) for information security. International Research
Journal of Engineering and Technology (IRJET), 5(4).
[12]. Sonia, R., & Harpreet, K. (2016). Technical survey on
cr yptography algorithms for network security.
International Journal of Advanced Research in
Computer Science and Software Engineering, 4(9), 204-209.
[13]. Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal,
M. (2017). A review paper on network security and
cryptography. Advances in Computational Sciences and
Technology, 10(5), 763-770.
[14]. Thambiraja, E., Ramesh, G., & Umarani, D. R. (2012).
A survey on various most common encr yption
techniques. International Journal of Advanced Research
in Computer Science and Software Engineering, 2(7),
226-233.
[15]. Verma, P., Shekhar, J., & Preety, A. A. (2015). A survey
for per formance analysis various cr yptography
techniques digital contents. International Journal of
Computer Science and Mobile Computing, 4(1), 522-531.