Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2011, Vol 11, Issue 3
Abstract
Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric key cryptography and RSA belongs to the category of asymmetric key cryptography. This paper comprises of brief description of RSA and DES cryptography algorithms and their existing vulnerabilities along with their countermeasures. Besides this, there is a theoretical performance analysis and comparisons of symmetric and asymmetric cryptography.
Authors and Affiliations
Yogesh Kumar , Rajiv Munjal , Harsh Sharma
DISASTER RECOVERY OF DATA BY USING DATA GUARD
Oracle Data Guard is the management, monitoring, and automation software infrastructure that creates, maintains, and monitors one or more standby databases to protect enterprise data from failures, disasters, errors, and...
Content Based Image Retrieval through Clustering
Content-based image retrieval (CBIR) is a technique used for extracting similar images from an image database. CBIR system is required to access images effectively and efficiently using information contained in image dat...
“SAFE & SECURE DATA COMMUNICATION IN MOBILE ADHOC NETWORK - BY USING IPSEC PROTOCOL”
Ad-hoc networks are a new paradigm in wireless communication due to its high significance in various sensitive and emergency operations. An Ad-hoc Network is a multi hop wireless network. Typically network nodes are inte...
Intrusion Detection System for Mobile Ad - Hoc Network Using Cluster-Based Approach
Today Mobile Ad-hoc Networks have wide spread use in normal as well as mission critical applications. Mobile ad hoc networks are more likely to be attacked due to lack of infrastructure and no central management. T...
CENTRAL CONVEYING & AUTO FEEDING SYSTEMS FOR AN INJECTION MOLDING SHOP
Nowadays injection molding is probably the most important method of Processing of consumer and industrial goods, and is performed everywhere in the world. The developing of injection molding becomes a competition from da...