ACCENTS Transactions on Information Security ISSN (Online): 2455-7196 Volume-1 Issue-1 January-2016
  1. 210
    Citations
Paper Title:
An overview of cryptographic algorithms and security challenges in big data
Author Name:
Anurag Sarkar
Abstract:
With an increasing reliance on online communications and transactions, the need for effective cryptographic algorithms to ensure security and reliability has never been more important, especially with the rise of big data. This paper provides a survey of different cryptographic algorithms that have been used in the past and are being used today to provide such security. The different cryptographic algorithms can be divided into three categories–symmetric key algorithms, asymmetric key algorithms and hash functions. The objective of the paper is to provide an overview of these different types of cryptographic algorithms and to serve as a basic introduction to the field. Another goal is to discuss some of the cryptographic challenges that are faced in the domain of big data.
Keywords:
Symmetric Key Cryptography, Asymmetric Key Cryptography, Cryptographic Hash Function, Cryptographic Algorithm, Big Data Security.
Cite this article:
Anurag Sarkar. An overview of cryptographic algorithms and security challenges in big data. ACCENTS Transactions on Information Security. 2016;1(1):7-14. DOI :
TamuBetTAMUBETatur kecepatan spin otomatis untuk progress game tanpa hambatanformula spin pemain pro mahjong ways bikin modal tetap aman dan terkendaligame edukatif mahjong ways ubah lanskap digitalkeberanian pantai timur kemenangan spektakuler mahjong ways dengan strategi iron fistmahir bermain mahjong teknologi gamifikasi ubah anda di dunia digitalmetode terbaru bikin mahjong ways semakin menggigit bagaimana rahasianyarahasia pola menang validasi rtp pragmatic dan pgsoft terbuktirahasia terbongkar pola rtp strategi taktis meraih kemenangan besarstrategi mahjong ways rahasia profit konsisten dengan modal minim