Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures

Abstract

Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric key cryptography and RSA belongs to the category of asymmetric key cryptography. This paper comprises of brief description of RSA and DES cryptography algorithms and their existing vulnerabilities along with their countermeasures. Besides this, there is a theoretical performance analysis and comparisons of symmetric and asymmetric cryptography.

Authors and Affiliations

Yogesh Kumar , Rajiv Munjal , Harsh Sharma

Keywords

Related Articles

DISASTER RECOVERY OF DATA BY USING DATA GUARD

Oracle Data Guard is the management, monitoring, and automation software infrastructure that creates, maintains, and monitors one or more standby databases to protect enterprise data from failures, disasters, errors, and...

Content Based Image Retrieval through Clustering

Content-based image retrieval (CBIR) is a technique used for extracting similar images from an image database. CBIR system is required to access images effectively and efficiently using information contained in image dat...

“SAFE & SECURE DATA COMMUNICATION IN MOBILE ADHOC NETWORK - BY USING IPSEC PROTOCOL”

Ad-hoc networks are a new paradigm in wireless communication due to its high significance in various sensitive and emergency operations. An Ad-hoc Network is a multi hop wireless network. Typically network nodes are inte...

Intrusion Detection System for Mobile Ad - Hoc Network Using Cluster-Based Approach

Today Mobile Ad-hoc Networks have wide spread use in normal as well as mission critical  applications. Mobile ad hoc networks are more likely to be attacked due to lack of infrastructure and no central management. T...

CENTRAL CONVEYING & AUTO FEEDING SYSTEMS FOR AN INJECTION MOLDING SHOP

Nowadays injection molding is probably the most important method of Processing of consumer and industrial goods, and is performed everywhere in the world. The developing of injection molding becomes a competition from da...

Download PDF file
  • EP ID EP92899
  • DOI -
  • Views 172
  • Downloads 0

How To Cite

Yogesh Kumar, Rajiv Munjal, Harsh Sharma (2011). Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 11(3), 60-63. https://europub.co.uk./articles/-A-92899