A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
Cloud computing present a new thinking to apply security since basic administrations are regularly outsourced to the cloud vendor. The current encryption techniques are regularly exposed to threats. Therefore it is important to study the features of the existing algorithm. This paper studies AES 128 and AES 256 based on various parameters and compare their performance that may suggest in development of better encryption technique.doi:10.26438/ijsrcse/v6i4.3033 fatcat:5cqxdpxnu5dmrhwhemd27ugoxe