CAPTCHA
5 + 1 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
  • Reset your password

User account menu

  • Log in
Home
Open Scholar Sphere

Main navigation

  • Home

Some comparison on application of cryptology algorithms

Breadcrumb

  • Home
  • Some comparison on application of cryptology algorithms

Saeed Seyed Agha Banihashemi *

School of international relations Faculty of science and technology.

Review Article

International Journal of Science and Research Archive, 2022, 05(01), 067–072.
Article DOI: 10.30574/ijsra.2022.5.1.0036
DOI url: https://doi.org/10.30574/ijsra.2022.5.1.0036

Received on 27 December 2021; revised on 06 February 2022; accepted on 08 February 2022

In this article we are going to compare useful cryptology algorithm in different area and explain them though application of algorithms have very large area but doing some comparison one can do decision of usage of introduced algorithm in right place. In this article first we mention important point of, digital signature and distribution key and then we compare these tow cryptology algorithms.

Cryptology; Algorithm; Cipher; Comparison

https://ijsra.net/node/445

Preview Article PDF

Saeed Seyed Agha Banihashemi. Some comparison on application of cryptology algorithms. International Journal of Science and Research Archive, 2022, 05(01), 067–072. https://doi.org/10.30574/ijsra.2022.5.1.0036

Copyright © 2022 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0

Footer menu

  • Contact
Powered by Drupal

Copyright © 2025 Open Scholar Sphere - All rights reserved

Developed & Designed by VS WebTech