Cryptography
Sign up for access to the world's latest research
Abstract
AI
AI
This paper discusses the significance of cryptography in protecting data from network attacks, focusing on symmetric and asymmetric encryption methods. It explains how symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption utilizes a pair of keys—public and private. The paper reviews various encryption algorithms such as AES and DES, highlighting their respective strengths and weaknesses.
Related papers
JOURNAL OF XI'AN UNIVERSITY OF ARCHITECTURE & TECHNOLOGY, 2020
One of the common problems of sharing resources over a data communication network is security. Generally sharing information's and resources over a network between a huge number of users is important especially in computer science and engineering field, and this becomes a critical problem for data security. Nowadays many algorithms used for encryption and decryption of data. Cryptography algorithms are divided into symmetric and asymmetric algorithms based on the key used between the sender and receiver of the pieces of information. this paper provides a comparison between symmetric and asymmetric algorithms by using two common algorithms such as AES and RSA. The comparison process focused on the execution time for encrypting and decrypting message of various word length.
Cryptography is the art and science of keeping massages secure. It is the study of techniques related to aspects of information security such as information privacy, integrity, authentication and non-repudiation. Cryptography is almost synonymous with encryption i.e. the conversion of plain text to a cryptic text to secure it against unauthorized users. Encryption techniques are typically divided into two generic types: symmetric key encryption and asymmetric key encryption. Encryption methods in which both the sender and receiver share the same key are referred to as symmetric key encryption schemes. Encryption methods in which encryption and decryption are performed using the different keys, one a public key and one a private key are referred to as asymmetric key encryption schemes. This paper provides a performance comparison between four popular and commonly used encryption algorithms: DES, 3DES, AES, and RSA. DES, 3DES, and AES are symmetric key encryption algorithms while as RSA is an asymmetric key encryption algorithm.
International Journal of Science Technology & Engineering
In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is which technique should be used to provide secure transmission. This paper provides an analysis of various encryption algorithms i.e. AES, DES, 3DES, Blowfish, RC4, RC6. The Comparison is also provided.
In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work focus on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm in cryptography. Secondly, by using decryption technique the receiver can view the original data. In this paper we implemented three encrypt techniques like AES, DES and RSA algorithms and compared their performance of encrypt techniques based on the analysis of its stimulated time at the time of encryption and decryption. Experiments results are given to analyses the effectiveness of each algorithm.
Asian Journal of Engineering and Technology, 2015
Symmetric Key Cryptography also called secret key cryptography is a simpler and faster means of data transfer through an unreliable channel. It requires fewer overheads in terms of speed and energy cost than Public Key cryptosystem. This paper provides an insight into various security aspects of different Symmetric Key Encryption Algorithms.
In this modern world of communications, cryptography has an important role in the security of data transmission and is the best method of data protection against passive and active fraud. Cryptography is an algorithmic process of converting a plain text or clear text message to a cipher text or cipher message based on an algorithm that both the sender and receiver know. There are a number of algorithms for performing encryption and decryption, but comparatively few such algorithms have stood the test of time. The most successful algorithms use a key. In this paper, we may gain knowledge about the cryptography algorithms and its role in Encryption and Decryption.
Cryptography refers to the tools and techniques used to make messages secure for communication between the participants and make messages immune to attacks by hackers. For private communication through public network, cryptography plays a very crucial role. Cryptography is a method to provide information confidentiality, authenticity and integrity .Cryptography can be categorized into symmetric or asymmetric. In this paper we have defined and analyzed various cryptographic symmetric algorithms like DES, Triple DES, AES and asymmetric key cryptographic algorithms like RSA.
Empirical Research Press Ltd. United Kingdom, 2022
As the things are settled down after the emergence of technology, and this is the decade of professionalism as far as technology is concerned, security of data is the major hurdle in this race. This is the era in which data is one click away from the users, so data needs to be more secured so that it can be avoided unauthorized access. For this purpose, different data security fields have also emerged to ensure data security and confidentiality. In this survey paper we will look up all the techniques used for data encryption and after that, we compare those techniques to provide the best algorithm to ensure that data is secured. We go categorically, as in most of the cases, symmetric encryption technique is applicable and, in a few cases, asymmetric is recommended. Firstly, in our study, we compare both the techniques with each other and then compare all the algorithms working under the above-mentioned categories concerning their time, efficiency, memory usage, latency, key size, and several rounds which will result in showing the best algorithm according to input data.
ijcem.org
Encryption algorithms are known to be computational intensive. Internet and networks applications growing very fast, so the needs to protect. Encryption plays the very important role in information security system. On the other side, the symmetric key algorithms consume a significant amount of computed resources such as speed, time, memory and cost. The symmetrical algorithms AES and DES as a security enhancement. Current AES and DES standards are applied to encrypt and to protect. This paper provides evaluation of the most common encryption algorithms namely: AES (Rijndael) (Advanced Encryption Standard) and DES (Data Encryption Algorithm). A comparison has been conducted for those encryption algorithms at different setting speed, time and cost. Our results show that AES is more suitable than DES.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.