• Corpus ID: 17413753

Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures

@inproceedings{Kumar2011ComparisonOS,
  title={Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures},
  author={Yogesh Kumar and Rajiv Munjal and Harsh Bardhan Sharma},
  year={2011}
}
Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric ke y cryptography and RSA belongs to the category of asymmetric key cryptography. This paper comprises o f brief description of RSA and DES cryptography algor ithms and their existing vulnerabilities along with their… 

Figures from this paper

PERFORMANCE ANALYSIS OF SYMMETRIC AND ASYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS
TLDR
The performance analysis of symmetric and asymmetric-key cryptography algorithms, in terms of different settings like block size of plaintext, key size, speed, efficiency and attacks is presented.
A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention
TLDR
This paper presents the result of the implementation and analysis that applied on several cryptographic algorithms such as DES, 3DES, AES, RSA and blowfish, and shows the comparisons between the previous cryptographic techniques in terms of performances, weaknesses and strengths.
Comparative Study of DES, 3DES, AES and RSA
TLDR
A comparative study between four widely used encryption algorithms DES, of DES, 3DES, AES and RSA on the basis of their ability to secure and protect data against attacks and speed of encryption and decryption is provided.
Overview and Performance Analysis of Encryption Algorithms
TLDR
In this paper, factors ensuring the achievement of efficiency, flexibility and security are the basis of this research and the best solution for symmetric and asymmetric encryption is produced.
COMPARATIVE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS
TLDR
Three algorithms DES, Triple DES and RSA have been analysed on their ability to secure data, time taken to encrypt data and throughput the algorithm requires.
Cryptographic Algorithms : Applications in Network Security
TLDR
The basic characteristics of different cryptographic algorithms i.e., Symmetric (secret) key cryptography, Asymmetric (public) key cryptographic and Hashing cryptography are described, which have been explored in data and network security.
Implementing the Secure Protocol for Exchanging the Symmetric Key of FPGA-based Embedded Systems
TLDR
The approach uses an asymmetric encryption algorithm to protect symmetric encryption keys from thefts and tampers over a transmission line and a protocol to ensure the integrity, confidentiality of the symmetric key, and the freshness of a transaction session is presented.
STUDY OF CRYPTOLOGY AND ITS FORMS IN TODAY’S SECURE WORLD
TLDR
The study of different encryption schemes and its usage along with different key management techniques and the application of digital signature with its complete operational principle that is used in daily life as a part of secure communication are reviewed.
Performance Analysis of Cryptographic Algorithms in the Information Security
TLDR
This paper mainly focuses on comparative analysis of (AES, DES, 3DES, BLOWFISH, RC4), Asymmetric, DSA, Diffie-Hellman, EI-Gamal, Pailier, Hashing (MD5, MD6, SHA, SHA256) algorithms.
A General Comparison of Symmetric and Asymmetric Cryptosystems for WSNs and an Overview of Location Based Encryption Technique for Improving Security
TLDR
A review of all these systems employed in the WSN architecture to provide security, including symmetric and asymmetric encryption techniques, are described in this paper.
...
...

References

SHOWING 1-10 OF 13 REFERENCES
The Data Encryption Standard (DES) and its strength against attacks
TLDR
Some of the safeguards against differential cryptanalysis that were built into the DES system from the beginning are shown, with the result that more than 10 15 bytes of chosen plaintext are required for this attack to succeed.
Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers
TLDR
A Web programming language to be analyzed with four Web browsers in term of their performances to process the encryption of the programming language’s script with the Web browsers is proposed and one of the encryption techniques that can be applied is introduced, which is the eXclusive OR (XOR) operation.
An improvement of Davies’ attack on DES
TLDR
This paper improves Davies’ attack on DES to become capable of breaking the full 16-round DES faster than the exhaustive search, and is the third successful attack onDES, faster than brute force, after differential cryptanalysis and linear cryptanalysis.
Cryptanalysis of RSA with Small Prime Difference
  • B. D. Weger
  • Mathematics, Computer Science
    Applicable Algebra in Engineering, Communication and Computing
  • 2002
 We show that choosing an RSA modulus with a small difference of its prime factors yields improvements on the small private exponent attacks of Wiener and Boneh-Durfee.
Cryptography and Network Security, 2 Ed
  • Tata Mcgraw hill, 2009, PP. 87-2004
  • 2009
Cryptography and Network Securi ty 4 Ed
  • Prentice Hall , 2005,PP. 58-309 .
  • 2005
Results of comparing tens of encryption algorithms using different settings-Crypto++ benchmark-. Retrieved October 1
  • Results of comparing tens of encryption algorithms using different settings-Crypto++ benchmark-. Retrieved October 1
  • 2008
Atul khate Cryptography and Network Security
  • Atul khate Cryptography and Network Security
Differential Cryptanalysis of Full DES
  • Differential Cryptanalysis of Full DES
Cryptanalysis of Low- Exponent
  • Cryptanalysis of Low- Exponent
...
...