A Comparative Analysis of Symmetric and Asymmetric Key Cryptography

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 05 | May -2017

p-ISSN: 2395-0072

www.irjet.net

A COMPARATIVE ANALYSIS OF SYMMETRIC AND ASYMMETRIC KEY CRYPTOGRAPHY Naveen Kumar R1, Poovarasan R2, Saravana Harish S3, Jagadish D4 School of Information Technology & Engineering,VIT University,Tamilnadu,India. --------------------------------------------------------------------***--------------------------------------------------------------------1234

Abstract - Arrange protection procedures start and

SYMMETRIC KEY CRYPTOGRAPHY: Symmetric key cryptography is likewise called mystery key or shared key cryptography. In this sort of cryptography, the sender and beneficiary share a typical key for both

execution is significant with the end goal of secured information transmission and privacy. Cryptography is a strategy which is produced exclusively with the end goal of information security and trustworthiness during the time spent correspondence. Despite the fact that few speculations and ideas exists, each changes with the measure of security it offers to the system channel. An imperative component which decides the kind of cryptography is key circulation. In light of the kind of key appropriation, cryptography is Comprehensively delegated symmetric and uneven. In this paper, the established calculations which are utilized for symmetric and awry cryptography.

encryption and decoding. The enter utilized as a part of this strategy is ensured without anyone else. The key is shared through correspondence. On the off chance that an interloper gets the key, the entire procedure is traded off and the gatecrasher can without much of a stretch unscramble the message. This strategy is favored on account of its quick administration and less asset prerequisite. The calculations looked at in this paper are DES, 3DES, AES, BLOWFISH, RC2, RC4, SKIPJACK.

Public and Private Key, Encryption, Decryption. Key Words:

1.INTRODUCTION

ASYMMETRIC KEY CRYPTOGRAPHY:

Cryptography is the strategy of scrambling plain content. This secures information and data from any inward or outer assaults. In this manner, it gives uprightness, classification;

The asymmetric key cryptography is otherwise called open key cryptography. Scrambling of content is completed utilizing open key of the sender and translating is doneutilizing the private key of the collector. The idea of self-accreditation is missing here on the grounds that advanced marks are utilized to bear witness to the keys. This technique gives better validation and security as the protection stays in place. There are different calculations to execute this cryptography system. They are RSA, DiffieHellman, ECC and Digital Signature Algorithm, Rabin, EIGamal.

non-renouncement and credibility to the mystery data. The writings required in cryptography are plain and figure writings. Plain messages are intelligible writings and the data which the sender means to send. The plain content is encoded to an obscured frame called the figure text. Based on the encryption strategy utilized, it is separated as symmetric and lopsided cryptography.

COMPARATIVE ANALYSIS OF TRADITIONAL

Current cryptography worries about the accompanying four destinations:  Concealment-unintended individual can't block the message.  Uprightness-no change is allowed between the sender and recipient.  Nonrepudiation-the sender of the message can't differ at a later stage his goals really taking shape of the data.  Authentication-the affirmation of sender's and collector's personality can be performed by each other.

© 2017, IRJET

|

Impact Factor value: 5.181

CRYPTOGRAPHY ALGORITHMS: Customary calculations are the current strategies utilized for accomplishing the procedure of cryptography. These calculations are very much tried before they are being actualized in an application. Each calculation contrasts with the each other on different terms. In light of the test outcomes, the accompanying (table 1) is inferred in view of the course of action, key measurements, number of rounds, and figure sort.

|

ISO 9001:2008 Certified Journal

|

Page 375


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.