Return to Article Details Performance Analysis of symmetric and asymmetric Encryption Algorithms Based on File, Image and Video Download Download PDF