www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 9 September, 2014 Page No. 8092-8096 Harshraj Shinde, IJECS Volume 3 Issue 9 September, 2014 Page No.8092-8096 Page 8092 A Review of Various Encryption Techniques Harshraj N. Shinde 1 , Aniruddha S. Raut 2 , Shubham R. Vidhale 3 , Rohit V. Sawant 4 , Vijay A. Kotkar 5 1 Student (UG), Department of Computer Engineering, A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India meharshraj@gmail.com 2 Student (UG), Department of Computer Engineering, A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India aniruddharaut007@gmail.com 3 Student (UG), Department of Computer Engineering, A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India srvidhale@gmail.com 4 Student (UG), Department of Computer Engineering, A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India rohitsawant3030@yahoo.co.in 5 Assistant Professor, Department of Computer Engineering, A.I.S.S.M.S College of Engineering, Pune, Maharashtra, India vijaykotkar26@gmail.com Abstract: In today’s world secure transmission of important or personal data is of big concern. The encryption of the data plays import ant factor of security while sending the information of data. Encryption of data means converting plain text to cipher text. There are many encryption techniques available, but the big question that arises is which one is good one or which one is suitable as per requirements. In this paper we do analysis of various encryption techniques viz. AES, BLOWFISH, DES, 3DES, RC4, RC6, RSA, UMARAM and UR5. Keywords: Encryption, Decryption, UR5, AES, Blowfish. 1. Introduction Internet has changed our lives drastically. Now internet is the core of our life, be it banking, shopping, socializing etc. everything is through internet now-a-days. As there were burglars, thieves or dacoits earlier to loot us, now we have hackers who track down our movements online find out our personal information and then attack us virtually. Therefore, the need of secure transferring of information or data is essential. Over the decade many techniques have been developed to encrypt the data which is to be sent over unsecure channel. New algorithms come by now and then, which are better than their predecessors in certain ways. As we all know every coin has two side’s likewise strong encryption techniques might also have a down side such as computational time taken or any other. In this paper we study some popularly used techniques and try to find out their strength and weaknesses. The paper is organized as follows. Section I gives an introduction and basic terminologies which might be required. Section II gives a brief about all the algorithms which are surveyed. Section III is the discussion part where pros and cons are discussed about the surveyed algorithms and then we conclude. 1.1 Basic Terminologies: A. Cryptography It is the practice and study of encryption techniques for securing the data. B. Plain text A text which makes sense in its own context or text which is created by user to be sent over network to receiver is known as plain text. For example, “Hello Sam, How are you?” is a plain text. C. Cipher Text The text which has no association with the plain text whatsoever or may look meaningless to others is called Cipher text. Cipher text is non-readable message which is to be sent to receiver from an unsecured channel. For example, “How are you, Mr. Sanjay?” is encrypted in such a way that if seen will look something like this, “hnchj56gvju^$#&GF”. D. Encryption The process of converting the plain text to cipher text is known as Encryption. Encryption requires a key and an algorithm to implement. The process of encryption is done at sender side.