Corpus ID: 17413753

Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures

@inproceedings{Kumar2011ComparisonOS,
  title={Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures},
  author={Yogesh Kumar and R. Munjal and H. Sharma},
  year={2011}
}
Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric ke y cryptography and RSA belongs to the category of asymmetric key cryptography. This paper comprises o f brief description of RSA and DES cryptography algor ithms and their existing vulnerabilities along with their… Expand
77 Citations

Figures from this paper

Comparative Study of DES, 3DES, AES and RSA
Cryptographic Algorithms : Applications in Network Security
STUDY OF CRYPTOLOGY AND ITS FORMS IN TODAY’S SECURE WORLD
Performance Analysis of Cryptographic Algorithms in the Information Security
An analysis and comparison for popular video encryption algorithms
...
1
2
3
4
5
...

References

SHOWING 1-6 OF 6 REFERENCES
The Data Encryption Standard (DES) and its strength against attacks
An improvement of Davies’ attack on DES
Cryptanalysis of RSA with Small Prime Difference
  • B. D. Weger
  • Mathematics, Computer Science
  • Applicable Algebra in Engineering, Communication and Computing
  • 2002
Cryptography and Network Security
Cryptography and Network Securi ty 4 Ed
  • Prentice Hall , 2005,PP. 58-309 .
  • 2005