Tannu Bala and Yogesh Kumar. Article: Asymmetric Algorithms and Symmetric Algorithms: A Review. IJCA Proceedings on International Conference on Advancements in Engineering and Technology ICAET 2015(4):1-4, August 2015. Full text available. BibTeX
@article{key:article, author = {Tannu Bala and Yogesh Kumar}, title = {Article: Asymmetric Algorithms and Symmetric Algorithms: A Review}, journal = {IJCA Proceedings on International Conference on Advancements in Engineering and Technology}, year = {2015}, volume = {ICAET 2015}, number = {4}, pages = {1-4}, month = {August}, note = {Full text available} }
Abstract
In these days securing a network is an important issue. Many techniques are provided to secure network. Cryptographic is a technique of transforming a message into such form which is unreadable, and then retransforming that message back to its original form. Cryptography works in two techniques: symmetric key also known as secret-key cryptography algorithms and asymmetric key also known as public-key cryptography algorithms. In this paper we are reviewing different symmetric and asymmetric algorithms.
References
- Gambhir, Ankit. "RSA Algorithm or DES Algorithm?" Journal of Engineering Computers & Applied Sciences 3. 4 (2014).
- Bhardwaj, CR S. "Modification of Des Algorithm. " International Journal of Innovative Research and Development 1. 9 (2012).
- Thakur, Jawahar, and Nagesh Kumar. "DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis. "International journal of emerging technology and advanced engineering 1. 2 (2011).
- Annapoorna Shetty, Shravya Shetty and Krithika. "A Review on Asymmetric Cryptography –RSA and ElGamal Algorithm" International Journal of Innovative Research in Computer and Communication Engineering 2014.
- Allen, Bryce. Implementing several attacks on plain ElGamal encryption. ProQuest, 2008.
- Lin, Franck. "Cryptography's Past, Present, and Future Role in Society".
- Singh, Sombir, Sunil K. Maakar, and Sudesh Kumar. "A Performance Analysis of DES and RSA Cryptography. " International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), ISSN: 2278-6856.
- Padmavathi, B. , and S. Ranjitha Kumari. "A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique. "International Journal of Science and Research 2. 4 (2013).
- Singh, Rashmi, and Shiv Kumar. "Elgamal's Algorithm in Cryptography. "International Journal of Scientific & Engineering Research 3 (2012).
- Menezes, Alfred J. , Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC press, 1996.
- Li, Xiaofei, Xuanjing Shen, and Haipeng Chen. "ElGamal Digital Signature Algorithm of Adding a Random Number. " Journal of Networks 6. 5 (2011): 774-782.
- Sison, Ariel M. , et al. "Implementation of Improved DES Algorithm in Securing Smart Card Data. " Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity. Springer Berlin Heidelberg, 2012. 252-263.
- Mahajan, Prerna, and Abhishek Sachdeva. "A study of Encryption Algorithms AES, DES and RSA for Security. " Global Journal of Computer Science and Technology 13. 15 (2013).
- William Stallings, " Cryptography and Network Security Principles and Practices", Prentice Hall, November 16, 2005.
- Elminaam, Diaa Salama Abd, Hatem Mohamed Abdual-Kader, and Mohiy Mohamed Hadhoud. "Evaluating The Performance of Symmetric Encryption Algorithms. " IJ Network Security 10. 3 (2010): 216-222.