Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures

Abstract

Internet and networks application are growing very fast, so the need to protect such application are increased by using cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric key cryptography and RSA belongs to the category of asymmetric key cryptography. This paper comprises of brief description of RSA and DES cryptography algorithms and their existing vulnerabilities along with their countermeasures. Besides this, there is a theoretical performance analysis and comparisons of symmetric and asymmetric cryptography.

Authors and Affiliations

Yogesh Kumar , Rajiv Munjal , Harsh Sharma

Keywords

Related Articles

Securing Route Discovery in MANETs: Analysis and Improvement

In this paper, we show that the security proof for the route discovery algorithm end air A is flawed, and moreover, this algorithm is vulnerable to a hidden channel attack. We also analyze the security framework that was...

Implementation of IMAGE STEGANOGRAPHY Based on Random LSB

Steganography is the technique of hiding a private message within a file in such a manner that third party cannot know the existence of matter or the hidden information. The purpose of Steganography is to create secrete...

COMPARITIVE STUDY OF SELECTED EQUITYDIVERSIFIED MUTUAL FUND SCHEMES

With the plethora of schemes available in the Indian markets, an investors needs to evaluate and  onsider various factors before making an investment decision. The present investigation is aimed to examine the perf...

ANALYSIS OF OFDM SYSTEM USING PILOT CHANNEL ESTIMATION

Orthogonal Frequency Division Multiplexing (OFDM) is multiplexing technology of orthogonal multicarrier, and the channel estimation model based on pilot in OFDM systems is analyzed; Now that, the channel estimation based...

ANALYSIS OF A SINGLE UNIT SHOCK MODEL BY USING REGENERATIVE POINT GRAPHICAL TECHNIQUE

For the doing the analysis of a stochastic system rapidly, the key reliability characteristics should be  asily and quickly evaluated. Gupta [4] introduced a new technique called Regenerative Point Graphical Te...

Download PDF file
  • EP ID EP92899
  • DOI -
  • Views 163
  • Downloads 0

How To Cite

Yogesh Kumar, Rajiv Munjal, Harsh Sharma (2011). Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 11(3), 60-63. https://europub.co.uk./articles/-A-92899