A Survey Paper on ASCII-Based Cryptographic Techniques
Abid Sultan, Yao Lin, Azhar Mushtaq ()
Additional contact information 
Abid Sultan, Yao Lin, Azhar Mushtaq: School of Software, Dalian University of Technology, China. Deparment of CS&IT University of Sargodha
International Journal of Innovations in Science & Technology, 2022, vol. 4, issue 4, 1087-1098
Abstract:
With the passage of time networking field has become much more advanced. Because of this advancement, the communicating parties don't want to rely on the third party for communication because a third party may misuse or share their personal information with someone else. That’s why there is a need for such a method at which we can rely on secure communication. In recent years a lot of cryptographic techniques based on ASCII values have been proposed, but selecting an efficient and effective technique from them is a big task. In this paper, we have made a comparison among several techniques based on certain parameters to find out the best one for the ease of the users.
Keywords: Symmetric; Asymmetric; Encryption; Decryption; Memory Consumption; Complexity (search for similar items in EconPapers)
Date: 2022
References: Add references at CitEc 
Citations: 
Downloads: (external link)
https://journal.50sea.com/index.php/IJIST/article/view/400/671 (application/pdf)
https://journal.50sea.com/index.php/IJIST/article/view/400 (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX 
RIS (EndNote, ProCite, RefMan) 
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:abq:ijist1:v:4:y:2022:i:4:p:1087-1098
Access Statistics for this article
International Journal of Innovations in Science & Technology is currently edited by Prof. Dr. Syed Amer Mahmood
More articles in International Journal of Innovations in Science & Technology  from  50sea
Bibliographic data for series maintained by Iqra Nazeer ().