Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Asymmetric Algorithms and Symmetric Algorithms: A Review

Print
PDF
IJCA Proceedings on International Conference on Advancements in Engineering and Technology
© 2015 by IJCA Journal
ICAET 2015 - Number 4
Year of Publication: 2015
Authors:
Tannu Bala
Yogesh Kumar

Tannu Bala and Yogesh Kumar. Article: Asymmetric Algorithms and Symmetric Algorithms: A Review. IJCA Proceedings on International Conference on Advancements in Engineering and Technology ICAET 2015(4):1-4, August 2015. Full text available. BibTeX

@article{key:article,
	author = {Tannu Bala and Yogesh Kumar},
	title = {Article: Asymmetric Algorithms and Symmetric Algorithms: A Review},
	journal = {IJCA Proceedings on International Conference on Advancements in Engineering and Technology},
	year = {2015},
	volume = {ICAET 2015},
	number = {4},
	pages = {1-4},
	month = {August},
	note = {Full text available}
}

Abstract

In these days securing a network is an important issue. Many techniques are provided to secure network. Cryptographic is a technique of transforming a message into such form which is unreadable, and then retransforming that message back to its original form. Cryptography works in two techniques: symmetric key also known as secret-key cryptography algorithms and asymmetric key also known as public-key cryptography algorithms. In this paper we are reviewing different symmetric and asymmetric algorithms.

References

  • Gambhir, Ankit. "RSA Algorithm or DES Algorithm?" Journal of Engineering Computers & Applied Sciences 3. 4 (2014).
  • Bhardwaj, CR S. "Modification of Des Algorithm. " International Journal of Innovative Research and Development 1. 9 (2012).
  • Thakur, Jawahar, and Nagesh Kumar. "DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis. "International journal of emerging technology and advanced engineering 1. 2 (2011).
  • Annapoorna Shetty, Shravya Shetty and Krithika. "A Review on Asymmetric Cryptography –RSA and ElGamal Algorithm" International Journal of Innovative Research in Computer and Communication Engineering 2014.
  • Allen, Bryce. Implementing several attacks on plain ElGamal encryption. ProQuest, 2008.
  • Lin, Franck. "Cryptography's Past, Present, and Future Role in Society".
  • Singh, Sombir, Sunil K. Maakar, and Sudesh Kumar. "A Performance Analysis of DES and RSA Cryptography. " International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), ISSN: 2278-6856.
  • Padmavathi, B. , and S. Ranjitha Kumari. "A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique. "International Journal of Science and Research 2. 4 (2013).
  • Singh, Rashmi, and Shiv Kumar. "Elgamal's Algorithm in Cryptography. "International Journal of Scientific & Engineering Research 3 (2012).
  • Menezes, Alfred J. , Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC press, 1996.
  • Li, Xiaofei, Xuanjing Shen, and Haipeng Chen. "ElGamal Digital Signature Algorithm of Adding a Random Number. " Journal of Networks 6. 5 (2011): 774-782.
  • Sison, Ariel M. , et al. "Implementation of Improved DES Algorithm in Securing Smart Card Data. " Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity. Springer Berlin Heidelberg, 2012. 252-263.
  • Mahajan, Prerna, and Abhishek Sachdeva. "A study of Encryption Algorithms AES, DES and RSA for Security. " Global Journal of Computer Science and Technology 13. 15 (2013).
  • William Stallings, " Cryptography and Network Security Principles and Practices", Prentice Hall, November 16, 2005.
  • Elminaam, Diaa Salama Abd, Hatem Mohamed Abdual-Kader, and Mohiy Mohamed Hadhoud. "Evaluating The Performance of Symmetric Encryption Algorithms. " IJ Network Security 10. 3 (2010): 216-222.