Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures

Abstract

Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric key cryptography and RSA belongs to the category of asymmetric key cryptography. This paper comprises of brief description of RSA and DES cryptography algorithms and their existing vulnerabilities along with their countermeasures. Besides this, there is a theoretical performance analysis and comparisons of symmetric and asymmetric cryptography.

Authors and Affiliations

Yogesh Kumar , Rajiv Munjal , Harsh Sharma

Keywords

Related Articles

Grid Technology

Grid computing is a means of allocating the computational power of a large number of computers to complex difficult computation or problem. Grid computing is a term referring to the combination of computer resources fr...

Fault Prediction in Object Oriented System Using the Coupling and Cohesion of Classes

Building efficient systems is one of the main challenges for software developers, who have been concerned with dependability-related issues asthey built and deployed. Lots of changes often needs including the nature of f...

 Impact of Foreign Direct Investment on Retail Industry of the Indian Economy

The Indian retail sector, particularly organized retail, is still under-developed and in a nascent stage and that, therefore, it is important that the domestic retail sector is allowed to grow and consolidate first, befo...

 DATA MINING AND MOBILE COMMUNICATION: AN OVERVIEW

Mobile communication companies generate a tremendous amount of data. These data include call detail data, which describes the calls that traverse the mobile communication networks, network data, which describes the state...

Review on Human Computer Interaction Learning From History & Need of Rethinking

Human-computer interaction (HCI) is the study of how people design, implement, and use interactive computer systems and how computers affect individuals, organizations, and society. This  encompasses not only ease o...

Download PDF file
  • EP ID EP92899
  • DOI -
  • Views 171
  • Downloads 0

How To Cite

Yogesh Kumar, Rajiv Munjal, Harsh Sharma (2011). Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 11(3), 60-63. https://europub.co.uk./articles/-A-92899