# Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures

@inproceedings{Kumar2011ComparisonOS, title={Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures}, author={Yogesh Kumar and Rajiv Munjal and Harsh Bardhan Sharma}, year={2011} }

Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric ke y cryptography and RSA belongs to the category of asymmetric key cryptography. This paper comprises o f brief description of RSA and DES cryptography algor ithms and their existing vulnerabilities along with their…

## Figures from this paper

## 100 Citations

PERFORMANCE ANALYSIS OF SYMMETRIC AND ASYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS

- Computer Science
- 2017

The performance analysis of symmetric and asymmetric-key cryptography algorithms, in terms of different settings like block size of plaintext, key size, speed, efficiency and attacks is presented.

A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention

- Computer Science, Mathematics
- 2018

This paper presents the result of the implementation and analysis that applied on several cryptographic algorithms such as DES, 3DES, AES, RSA and blowfish, and shows the comparisons between the previous cryptographic techniques in terms of performances, weaknesses and strengths.

Comparative Study of DES, 3DES, AES and RSA

- Computer Science, MathematicsBIOINFORMATICS 2013
- 2013

A comparative study between four widely used encryption algorithms DES, of DES, 3DES, AES and RSA on the basis of their ability to secure and protect data against attacks and speed of encryption and decryption is provided.

Overview and Performance Analysis of Encryption Algorithms

- Computer ScienceJournal of Physics: Conference Series
- 2020

In this paper, factors ensuring the achievement of efficiency, flexibility and security are the basis of this research and the best solution for symmetric and asymmetric encryption is produced.

COMPARATIVE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS

- Computer Science, Mathematics
- 2013

Three algorithms DES, Triple DES and RSA have been analysed on their ability to secure data, time taken to encrypt data and throughput the algorithm requires.

Cryptographic Algorithms : Applications in Network Security

- Computer Science, Mathematics
- 2017

The basic characteristics of different cryptographic algorithms i.e., Symmetric (secret) key cryptography, Asymmetric (public) key cryptographic and Hashing cryptography are described, which have been explored in data and network security.

Implementing the Secure Protocol for Exchanging the Symmetric Key of FPGA-based Embedded Systems

- Computer Science, Mathematics
- 2014

The approach uses an asymmetric encryption algorithm to protect symmetric encryption keys from thefts and tampers over a transmission line and a protocol to ensure the integrity, confidentiality of the symmetric key, and the freshness of a transaction session is presented.

STUDY OF CRYPTOLOGY AND ITS FORMS IN TODAY’S SECURE WORLD

- Computer Science, Mathematics
- 2017

The study of different encryption schemes and its usage along with different key management techniques and the application of digital signature with its complete operational principle that is used in daily life as a part of secure communication are reviewed.

Performance Analysis of Cryptographic Algorithms in the Information Security

- Computer Science
- 2020

This paper mainly focuses on comparative analysis of (AES, DES, 3DES, BLOWFISH, RC4), Asymmetric, DSA, Diffie-Hellman, EI-Gamal, Pailier, Hashing (MD5, MD6, SHA, SHA256) algorithms.

A General Comparison of Symmetric and Asymmetric Cryptosystems for WSNs and an Overview of Location Based Encryption Technique for Improving Security

- Computer Science
- 2014

A review of all these systems employed in the WSN architecture to provide security, including symmetric and asymmetric encryption techniques, are described in this paper.

## References

SHOWING 1-10 OF 13 REFERENCES

The Data Encryption Standard (DES) and its strength against attacks

- Computer Science, MathematicsIBM J. Res. Dev.
- 1994

Some of the safeguards against differential cryptanalysis that were built into the DES system from the beginning are shown, with the result that more than 10 15 bytes of chosen plaintext are required for this attack to succeed.

Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers

- Computer Science
- 2008

A Web programming language to be analyzed with four Web browsers in term of their performances to process the encryption of the programming language’s script with the Web browsers is proposed and one of the encryption techniques that can be applied is introduced, which is the eXclusive OR (XOR) operation.

An improvement of Davies’ attack on DES

- Computer Science, MathematicsJournal of Cryptology
- 2007

This paper improves Davies’ attack on DES to become capable of breaking the full 16-round DES faster than the exhaustive search, and is the third successful attack onDES, faster than brute force, after differential cryptanalysis and linear cryptanalysis.

Cryptanalysis of RSA with Small Prime Difference

- Mathematics, Computer ScienceApplicable Algebra in Engineering, Communication and Computing
- 2002

We show that choosing an RSA modulus with a small difference of its prime factors yields improvements on the small private exponent attacks of Wiener and Boneh-Durfee.

Cryptography and Network Security, 2 Ed

- Tata Mcgraw hill, 2009, PP. 87-2004
- 2009

Cryptography and Network Securi ty 4 Ed

- Prentice Hall , 2005,PP. 58-309 .
- 2005

Results of comparing tens of encryption algorithms using different settings-Crypto++ benchmark-. Retrieved October 1

- Results of comparing tens of encryption algorithms using different settings-Crypto++ benchmark-. Retrieved October 1
- 2008

Atul khate Cryptography and Network Security

- Atul khate Cryptography and Network Security

Differential Cryptanalysis of Full DES

- Differential Cryptanalysis of Full DES

Cryptanalysis of Low- Exponent

- Cryptanalysis of Low- Exponent