CFP last date
20 May 2024
Reseach Article

Asymmetric Algorithms and Symmetric Algorithms: A Review

Published on August 2015 by Tannu Bala, Yogesh Kumar
International Conference on Advancements in Engineering and Technology
Foundation of Computer Science USA
ICAET2015 - Number 4
August 2015
Authors: Tannu Bala, Yogesh Kumar
a556564d-927b-4feb-bd31-e75afb5394b6

Tannu Bala, Yogesh Kumar . Asymmetric Algorithms and Symmetric Algorithms: A Review. International Conference on Advancements in Engineering and Technology. ICAET2015, 4 (August 2015), 1-4.

@article{
author = { Tannu Bala, Yogesh Kumar },
title = { Asymmetric Algorithms and Symmetric Algorithms: A Review },
journal = { International Conference on Advancements in Engineering and Technology },
issue_date = { August 2015 },
volume = { ICAET2015 },
number = { 4 },
month = { August },
year = { 2015 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/icaet2015/number4/22226-4049/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advancements in Engineering and Technology
%A Tannu Bala
%A Yogesh Kumar
%T Asymmetric Algorithms and Symmetric Algorithms: A Review
%J International Conference on Advancements in Engineering and Technology
%@ 0975-8887
%V ICAET2015
%N 4
%P 1-4
%D 2015
%I International Journal of Computer Applications
Abstract

In these days securing a network is an important issue. Many techniques are provided to secure network. Cryptographic is a technique of transforming a message into such form which is unreadable, and then retransforming that message back to its original form. Cryptography works in two techniques: symmetric key also known as secret-key cryptography algorithms and asymmetric key also known as public-key cryptography algorithms. In this paper we are reviewing different symmetric and asymmetric algorithms.

References
  1. Gambhir, Ankit. "RSA Algorithm or DES Algorithm?" Journal of Engineering Computers & Applied Sciences 3. 4 (2014).
  2. Bhardwaj, CR S. "Modification of Des Algorithm. " International Journal of Innovative Research and Development 1. 9 (2012).
  3. Thakur, Jawahar, and Nagesh Kumar. "DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis. "International journal of emerging technology and advanced engineering 1. 2 (2011).
  4. Annapoorna Shetty, Shravya Shetty and Krithika. "A Review on Asymmetric Cryptography –RSA and ElGamal Algorithm" International Journal of Innovative Research in Computer and Communication Engineering 2014.
  5. Allen, Bryce. Implementing several attacks on plain ElGamal encryption. ProQuest, 2008.
  6. Lin, Franck. "Cryptography's Past, Present, and Future Role in Society".
  7. Singh, Sombir, Sunil K. Maakar, and Sudesh Kumar. "A Performance Analysis of DES and RSA Cryptography. " International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), ISSN: 2278-6856.
  8. Padmavathi, B. , and S. Ranjitha Kumari. "A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique. "International Journal of Science and Research 2. 4 (2013).
  9. Singh, Rashmi, and Shiv Kumar. "Elgamal's Algorithm in Cryptography. "International Journal of Scientific & Engineering Research 3 (2012).
  10. Menezes, Alfred J. , Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC press, 1996.
  11. Li, Xiaofei, Xuanjing Shen, and Haipeng Chen. "ElGamal Digital Signature Algorithm of Adding a Random Number. " Journal of Networks 6. 5 (2011): 774-782.
  12. Sison, Ariel M. , et al. "Implementation of Improved DES Algorithm in Securing Smart Card Data. " Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity. Springer Berlin Heidelberg, 2012. 252-263.
  13. Mahajan, Prerna, and Abhishek Sachdeva. "A study of Encryption Algorithms AES, DES and RSA for Security. " Global Journal of Computer Science and Technology 13. 15 (2013).
  14. William Stallings, " Cryptography and Network Security Principles and Practices", Prentice Hall, November 16, 2005.
  15. Elminaam, Diaa Salama Abd, Hatem Mohamed Abdual-Kader, and Mohiy Mohamed Hadhoud. "Evaluating The Performance of Symmetric Encryption Algorithms. " IJ Network Security 10. 3 (2010): 216-222.
Index Terms

Computer Science
Information Sciences

Keywords

Rsa (rivest Shamir Aldeman) El-gamal Symmetric Cryptography Asymmetric Cryptography.