comparative Study of various Cryptographic algorithm used in bouncy castle toolkit

Κλειστό Αναρτήθηκε Nov 26, 2014 Πληρώθηκε κατά την παράδοση
Κλειστό Πληρώθηκε κατά την παράδοση

In today’s world communication mobile computing device has increased a lot. However, the communication over the mobile device must be secure. There must be secure transfer of information in order to provide Security, integrity and secure message transfer.

HTTPS might not be sufficient. Developer needs to take the help of various cryptographic packages. These packages are available as Third party mobile cryptographic toolkit. This paper shows a comparison of various algorithms that are included in the bouncy castle toolkit. There key generation and relative study of both Symmetric and Asymmetric algorithm perform and will proves which algorithm is better and efficient.

Java

Ταυτότητα Εργασίας: #6786562

Σχετικά με την εργασία

Απομακρυσμένη εργασία Ενεργό Jan 2, 2015