SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online),
INTERNATIONAL JOURNAL OF MANAGEMENT (IJM)
Volume 4, Issue 6, November - December (2013)
ISSN 0976-6502 (Print)
ISSN 0976-6510 (Online)
Volume 4, Issue 6, November - December (2013), pp. 209-212
© IAEME: www.iaeme.com/ijm.asp
Journal Impact Factor (2013): 6.9071 (Calculated by GISI)
www.jifactor.com

IJM
©IAEME

DISTINGUISH FROM SYMMETRIC AND ASYMMETRIC CRYPTO
SYSTEMS. CITE THE STRENGTHS AND SHORTCOMINGS OF THE EACH
SYSTEM
V. Sridevi1, V. Sumathi2 and M. Guru Prasad3
1

2

Department of Biotechnology, Sri Venkateswara University, Tirupati, A.P
Department of Biotechnology, Sri Padmavati Mahila Visvavidyalayam, Tirupati, A.P.
3
Department of Biochemistry, Bharatiyar University, Coimbatore, Chennai.

ABSTRACT
In a symmetric cipher, both parties must use the same key for encryption and decryption.
This means that the encryption key must be shared between the two parties before any messages can
be decrypted. Symmetric systems are also known as shared secret systems or private key systems.
Symmetric ciphers are significantly faster than asymmetric ciphers, but the requirements for key
exchange make them difficult to use. In an asymmetric cipher, the encryption key and the decryption
keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is
shared publicly. The second key, the private key, should never be shared with anyone.When you
send a message using asymmetric cryptography, you encrypt the message using the recipients public
key. The recipient then decrypts the message using his private key. That is why the system is called
asymmetric. Because asymmetric ciphers tend to be significantly more computationally intensive,
they are usually used in combination with symmetric ciphers to implement effect public key
cryptography. The asymmetric cipher is used to encrypt a session key and the encrypted session key
is then used to encrypt the actual message. This gives the key-exchange benefits of asymmetric
ciphers with the speed of symmetric ciphers.
1. INTRODUCTION
Throughout the history of cryptography, hundreds of cryptosystems have been developed.
The earliest ones, as well as many later ones, relied on the complete secrecy in transferring keys
between the sender and recipient. These kinds of systems, called secret key cryptosystem, have just a
single key which is used for both encryption and decryption; therefore, these systems are more
frequently known as symmetric cryptosystems. In contrast to a symmetric cryptosystem, an
asymmetric cryptosystem is associated with a pair of keys; therefore, not everything related to the
cryptosystem needs to be kept secret. This kind of a cryptosystem is also called public-key
209
International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online),
Volume 4, Issue 6, November - December (2013)

cryptosystem. A public key cryptosystem consists of a public key, which is used for encryption, and
a private key, used for decryption. Therefore, anybody can encrypt plaintext since the encryption key
is available to everyone, but only the holders of the private key corresponding to the public key used
for encryption can decrypt the ciphertext [1, 2].
The first asymmetric cryptosystems appeared in 1970s to address the problem of key
management in symmetric cryptography. In 1976, Whitfield Diffie and Martin Hellman published a
key management scheme that was the predecessor to the first public-key cryptosystems; it later
became known as the Diffie-Hellman Key Exchange Protocol. Later, several asymmetric
cryptosystems were developed, including ElGamal, Rabin, and RSA cryptosystems [6,2,1].
The public-key cryptosystems rely heavily on mathematical functions known as trapdoor
functions; these are easy to apply in one direction but extremely difficult to apply in the inverse,
which is required for decryption of the ciphertext [1]. The major difference between the main
asymmetric cryptosystems is the function used to produce the public key. Many of them rely on
factoring a large number into two large prime numbers that compose the given number. This is not a
trivial task, especially when each of the primes generally have more than 100 digits, which is usually
the case in well-designed cryptosystems.
However, there are other mechanisms used to derive public keys that we will briefly explain
in the following sections.
1.1 The Diffie-Hellman Key Exchange Protocol
The Diffie-Hellman Key Exchange Protocol, often shortened to simply Diffie-Hellman, was
invented in 1976 through the collaboration of Whitfield Diffie and Martin Hellman ([9], [1]). DiffieHellman is not a cryptosystem; rather, it is a means for two parties to jointly produce a shared secret
key over an insecure communications channel with minimal risk of a third party obtaining the key. In
fact, Diffie-Hellman was the first such method. Diffie-Hellman accomplishes this by taking
advantage of the properties of multiplicative groups of integers modulo that is, Zon. Specifically, we
select a prime number for, the modulo value of the group, and we select a prime number as the
generator of the group. These two conditions ensure that Zon will always be a cyclic group this is the
property needed for Diffie-Hellman to work as expected.
The key to Diffie-Hellman, of course, is that Alice and Bob end up with the same shared
secret key in steps 4 and 5 of the above algorithm. This shared secret can be used to establish a
secure communications channel. Considering this allows us to understand that the Diffie-Hellman
Key Exchange Protocol is an excellent tool that can be used to securely establish a secure
communications channel when only insecure means of communication are available.
1.2 ElGamal
The ElGamal encryption system was developed by Taher Elgamal in 1984 ([8], [1]). It is
based heavily on the same principle as Diffie-Hellman: a cyclic multiplicative group modulo some
prime number.
Generally speaking, of course, the number of possible messages will far exceed p − 1. To
remedy this, ElGamal is generally used multiple times on several pieces of the message. One obvious
disadvantage of ElGamal, consequently, is that any ciphertext generated using ElGamal is twice as
large as the plaintext.
Another disadvantage is that p−1 must generally be larger than the number of possible
messages, simply because this number is unlikely to be prime.
It is easy to verify that ElGamal is indeed a valid cryptosystem: cx1
ÂŽ (gk)x ÂŽ (gx)k ÂŽ yk ÂŽc2/m (mod p).

210
International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online),
Volume 4, Issue 6, November - December (2013)

1.3 Rabin Cryptosystem
The Rabin cryptosystem is another example of an asymmetric cryptosystem. It was created
by Michael O. Rabin in 1979. Rabin’s work has theoretical importance because it provided the first
provable security for public-key cryptosystems [6]. It can be proven that recovering the entire
plaintext from the ciphertext has same complexity as factoring large numbers [1,7].
The effectiveness of this algorithm has been questioned mainly because of the fact that it produces 4
results, one correct and 3 false. Identifying the correct one is usually performed with a guess. If the
plaintext is intended to represent a text message, guessing is not difficult; however, if the plaintext is
intended to represent a numerical value, this issue becomes a problem that must be solved with some
kind of disambiguation scheme. It is possible to choose plaintexts with special structures, or to add
padding, to eliminate this problem. The most common way of implementing disambiguation is
known as Blum disambiguation, which is based on characteristics of pseudorandom number
generator [6].
The efficiency of the Rabin cryptosystem is at least as good as that of the RSA cryptosystem.
In Rabin, encryption is computed by calculating a square modulon. This is more efficient than RSA,
which requires the calculation of at least a cube. For decryption, the results of congruence are applied
through the Chinese remainder theorem, along with two modular exponentiations. Here the
efficiency is comparable to RSA. Disambiguation introduces additional computational costs, which
is the main reason preventing the Rabin cryptosystem from finding widespread practical use.
1.4 RSA
RSA is the most commonly used cryptosystem these days. It was invented in 1977 by Ron
Rivest, Adi Shamir, and Len Adleman, where the name RSA comes from [4].The most important
part of asymmetric algorithms is the key generation.
The security of RSA is based on difficulty of factoring large prime numbers. Therefore, the
choice of primes is very crucial, which raises the biggest issue. The problem with sufficiently large
primes is to check their primality, to compute gcd(e, Á(n)) to make sure they are relatively prime,
and to compute the private key d satisfying ed Ž 1 (mod Á(n)). There are several algorithms that can
speed up some calculations required for encryption and decryption of a message using the RSA
algorithm, which make this cryptosystem very likely to be used these days for transmitting secure
information ([4], [5]).
2. WEAKNESSES IN ASYMMETRIC CRYPTOSYSTEMS
Even though asymmetric cryptosystems are relatively secure, there are a few issues that do
not guarantee the complete safety and invulnerability of these kinds of cryptosystems. One of the
main problems in public-key cryptography is to prove that the public key is authentic, i.e., it has not
been replaced with another key by a malicious user. There are two main approaches to address this
problem. The first approach relies on a third party, which acts as a certificate authority that certifies
the ownership of key. The other approach is the “web of trust” to which a user has access through a
password [2].
As any other cryptosystem, the asymmetric one is vulnerable to brute-force attacks. However,
with a large enough key, the exhaustive search attack is not practical, and therefore, this type of
weakness can be reduced by enlarging the size of the key [2].
The other method of distributing private key of an asymmetric cryptosystem is through the
key translation center which acts as a trusted server between parties that do not directly share the key
between them. Each party shares a different key with the key translation center. The way this sharing
information works is that one person sends an encrypted message to the trusted server using its own

211
International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online),
Volume 4, Issue 6, November - December (2013)

key, and the center translates it to the message that can be decrypted using the other party’s key. To
accomplish this, the key transfer center maintains a secure database of users’ secret keys [3].
Another example of systems implicitly guaranteeing authenticity is the system using selfcertified public keys, which is exactly the same as the identity-based public key with the exception
that the manipulations of the public key are done by the individual user rather than the trusted third
party [3].
CONCLUSION
Asymmetric cryptosystems have become a popular way of encrypting data since their first
appearance in the 1970s. The main reason for development of these types of cryptosystems lies in the
security of key management and the vulnerability under malicious attacks. The asymmetric
cryptosystem contains a pair of keys, an encryption key, which is available to public, and a
decryption key, which is private.
REFERENCES
[1]

Mao, W., Modern Cryptography: Theory & Practice, Upper Saddle River, NJ: Prentice Hall
PTR, 2004.
[2] “Public-key cryptography,” Wikipedia,
<http://en.wikipedia.org/wiki/Public-key cryptography>
[3] Menezes, A., van Oorschot, P., and Vanstone, S. Handbook of applied cryptography, CRC
Press, 1996.
[4] “RSA algorithm,” <http://www.dimgt.com.au/rsa alg.html>
[5] “RSA cryptosystem,” <http://ww3.algorithmdesign.net/handouts/RSA.pdf>
[6] “Rabin cryptosystems,” Wikipedia, <http://en.wikipedia.org/wiki/Rabin cryptosystem>
[7] N. R. Wagner, The laws of cryptography: Rabin’s version of RSA,
<http://www.cs.utsa.edu/ wagner/laws/Rabin.html>
[8] “ElGamal encryption,” Wikipedia, <http://en.wikipedia.org/wiki/ElGamal encryption>
[9] “Diffie-Hellman key exchange,” Wikipedia,
<http://en.wikipedia.org/wiki/Diffie-Hellman key exchange>
[10] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using
Reconfigurable Hardware”, International Journal of Computer Engineering & Technology
(IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.
[11] Varun Shukla and Abhishek Choubey, “A Comparative Analysis of the Possible Attacks on
RSA Cryptosystem”, International Journal of Electronics and Communication Engineering
& Technology (IJECET), Volume 3, Issue 1, 2012, pp. 92 - 97, ISSN Print: 0976- 6464,
ISSN Online: 0976 –6472.

212

Weitere Àhnliche Inhalte

Was ist angesagt?

Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security EncryptionJoel Briza
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsdaxesh chauhan
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS SecurityAaron Zauner
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptographychauhankapil
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryptionphanleson
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017YogeshDhamke2
 

Was ist angesagt? (15)

Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Ch9
Ch9Ch9
Ch9
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017
 

Andere mochten auch

Andere mochten auch (8)

20320130406032
2032013040603220320130406032
20320130406032
 
50120130406038
5012013040603850120130406038
50120130406038
 
1. tutorial unity3d introducciĂłn
1.  tutorial unity3d introducciĂłn1.  tutorial unity3d introducciĂłn
1. tutorial unity3d introducciĂłn
 
30120130406024
3012013040602430120130406024
30120130406024
 
30120130406022
3012013040602230120130406022
30120130406022
 
Työmarkkinapoliittinen mielipideilmasto 2012
Työmarkkinapoliittinen mielipideilmasto 2012Työmarkkinapoliittinen mielipideilmasto 2012
Työmarkkinapoliittinen mielipideilmasto 2012
 
2. tutorial unity3d-disparo
2.  tutorial unity3d-disparo2.  tutorial unity3d-disparo
2. tutorial unity3d-disparo
 
20320130406020 2
20320130406020 220320130406020 2
20320130406020 2
 

Ähnlich wie 10120130406026

Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxmustafaenayat
 
Nt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm PaperNt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm PaperJennifer Reither
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
A Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA VariantsA Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA Variantsijsrd.com
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Techglyphs
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud ComputingIRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud ComputingIRJET Journal
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
cryptography
cryptographycryptography
cryptographyBalaji Ravi
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneSecurityTube.Net
 
Unit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptxUnit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptxSayeeKumarMadhesh
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comphanleson
 

Ähnlich wie 10120130406026 (20)

H42063743
H42063743H42063743
H42063743
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
 
Nt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm PaperNt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm Paper
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
A Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA VariantsA Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA Variants
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud ComputingIRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
cryptography
cryptographycryptography
cryptography
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
Unit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptxUnit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptx
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

KĂŒrzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

KĂŒrzlich hochgeladen (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

10120130406026

  • 1. International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), INTERNATIONAL JOURNAL OF MANAGEMENT (IJM) Volume 4, Issue 6, November - December (2013) ISSN 0976-6502 (Print) ISSN 0976-6510 (Online) Volume 4, Issue 6, November - December (2013), pp. 209-212 © IAEME: www.iaeme.com/ijm.asp Journal Impact Factor (2013): 6.9071 (Calculated by GISI) www.jifactor.com IJM ©IAEME DISTINGUISH FROM SYMMETRIC AND ASYMMETRIC CRYPTO SYSTEMS. CITE THE STRENGTHS AND SHORTCOMINGS OF THE EACH SYSTEM V. Sridevi1, V. Sumathi2 and M. Guru Prasad3 1 2 Department of Biotechnology, Sri Venkateswara University, Tirupati, A.P Department of Biotechnology, Sri Padmavati Mahila Visvavidyalayam, Tirupati, A.P. 3 Department of Biochemistry, Bharatiyar University, Coimbatore, Chennai. ABSTRACT In a symmetric cipher, both parties must use the same key for encryption and decryption. This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems. Symmetric ciphers are significantly faster than asymmetric ciphers, but the requirements for key exchange make them difficult to use. In an asymmetric cipher, the encryption key and the decryption keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is shared publicly. The second key, the private key, should never be shared with anyone.When you send a message using asymmetric cryptography, you encrypt the message using the recipients public key. The recipient then decrypts the message using his private key. That is why the system is called asymmetric. Because asymmetric ciphers tend to be significantly more computationally intensive, they are usually used in combination with symmetric ciphers to implement effect public key cryptography. The asymmetric cipher is used to encrypt a session key and the encrypted session key is then used to encrypt the actual message. This gives the key-exchange benefits of asymmetric ciphers with the speed of symmetric ciphers. 1. INTRODUCTION Throughout the history of cryptography, hundreds of cryptosystems have been developed. The earliest ones, as well as many later ones, relied on the complete secrecy in transferring keys between the sender and recipient. These kinds of systems, called secret key cryptosystem, have just a single key which is used for both encryption and decryption; therefore, these systems are more frequently known as symmetric cryptosystems. In contrast to a symmetric cryptosystem, an asymmetric cryptosystem is associated with a pair of keys; therefore, not everything related to the cryptosystem needs to be kept secret. This kind of a cryptosystem is also called public-key 209
  • 2. International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), Volume 4, Issue 6, November - December (2013) cryptosystem. A public key cryptosystem consists of a public key, which is used for encryption, and a private key, used for decryption. Therefore, anybody can encrypt plaintext since the encryption key is available to everyone, but only the holders of the private key corresponding to the public key used for encryption can decrypt the ciphertext [1, 2]. The first asymmetric cryptosystems appeared in 1970s to address the problem of key management in symmetric cryptography. In 1976, Whitfield Diffie and Martin Hellman published a key management scheme that was the predecessor to the first public-key cryptosystems; it later became known as the Diffie-Hellman Key Exchange Protocol. Later, several asymmetric cryptosystems were developed, including ElGamal, Rabin, and RSA cryptosystems [6,2,1]. The public-key cryptosystems rely heavily on mathematical functions known as trapdoor functions; these are easy to apply in one direction but extremely difficult to apply in the inverse, which is required for decryption of the ciphertext [1]. The major difference between the main asymmetric cryptosystems is the function used to produce the public key. Many of them rely on factoring a large number into two large prime numbers that compose the given number. This is not a trivial task, especially when each of the primes generally have more than 100 digits, which is usually the case in well-designed cryptosystems. However, there are other mechanisms used to derive public keys that we will briefly explain in the following sections. 1.1 The Diffie-Hellman Key Exchange Protocol The Diffie-Hellman Key Exchange Protocol, often shortened to simply Diffie-Hellman, was invented in 1976 through the collaboration of Whitfield Diffie and Martin Hellman ([9], [1]). DiffieHellman is not a cryptosystem; rather, it is a means for two parties to jointly produce a shared secret key over an insecure communications channel with minimal risk of a third party obtaining the key. In fact, Diffie-Hellman was the first such method. Diffie-Hellman accomplishes this by taking advantage of the properties of multiplicative groups of integers modulo that is, Zon. Specifically, we select a prime number for, the modulo value of the group, and we select a prime number as the generator of the group. These two conditions ensure that Zon will always be a cyclic group this is the property needed for Diffie-Hellman to work as expected. The key to Diffie-Hellman, of course, is that Alice and Bob end up with the same shared secret key in steps 4 and 5 of the above algorithm. This shared secret can be used to establish a secure communications channel. Considering this allows us to understand that the Diffie-Hellman Key Exchange Protocol is an excellent tool that can be used to securely establish a secure communications channel when only insecure means of communication are available. 1.2 ElGamal The ElGamal encryption system was developed by Taher Elgamal in 1984 ([8], [1]). It is based heavily on the same principle as Diffie-Hellman: a cyclic multiplicative group modulo some prime number. Generally speaking, of course, the number of possible messages will far exceed p − 1. To remedy this, ElGamal is generally used multiple times on several pieces of the message. One obvious disadvantage of ElGamal, consequently, is that any ciphertext generated using ElGamal is twice as large as the plaintext. Another disadvantage is that p−1 must generally be larger than the number of possible messages, simply because this number is unlikely to be prime. It is easy to verify that ElGamal is indeed a valid cryptosystem: cx1 ÂŽ (gk)x ÂŽ (gx)k ÂŽ yk ÂŽc2/m (mod p). 210
  • 3. International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), Volume 4, Issue 6, November - December (2013) 1.3 Rabin Cryptosystem The Rabin cryptosystem is another example of an asymmetric cryptosystem. It was created by Michael O. Rabin in 1979. Rabin’s work has theoretical importance because it provided the first provable security for public-key cryptosystems [6]. It can be proven that recovering the entire plaintext from the ciphertext has same complexity as factoring large numbers [1,7]. The effectiveness of this algorithm has been questioned mainly because of the fact that it produces 4 results, one correct and 3 false. Identifying the correct one is usually performed with a guess. If the plaintext is intended to represent a text message, guessing is not difficult; however, if the plaintext is intended to represent a numerical value, this issue becomes a problem that must be solved with some kind of disambiguation scheme. It is possible to choose plaintexts with special structures, or to add padding, to eliminate this problem. The most common way of implementing disambiguation is known as Blum disambiguation, which is based on characteristics of pseudorandom number generator [6]. The efficiency of the Rabin cryptosystem is at least as good as that of the RSA cryptosystem. In Rabin, encryption is computed by calculating a square modulon. This is more efficient than RSA, which requires the calculation of at least a cube. For decryption, the results of congruence are applied through the Chinese remainder theorem, along with two modular exponentiations. Here the efficiency is comparable to RSA. Disambiguation introduces additional computational costs, which is the main reason preventing the Rabin cryptosystem from finding widespread practical use. 1.4 RSA RSA is the most commonly used cryptosystem these days. It was invented in 1977 by Ron Rivest, Adi Shamir, and Len Adleman, where the name RSA comes from [4].The most important part of asymmetric algorithms is the key generation. The security of RSA is based on difficulty of factoring large prime numbers. Therefore, the choice of primes is very crucial, which raises the biggest issue. The problem with sufficiently large primes is to check their primality, to compute gcd(e, Á(n)) to make sure they are relatively prime, and to compute the private key d satisfying ed ÂŽ 1 (mod Á(n)). There are several algorithms that can speed up some calculations required for encryption and decryption of a message using the RSA algorithm, which make this cryptosystem very likely to be used these days for transmitting secure information ([4], [5]). 2. WEAKNESSES IN ASYMMETRIC CRYPTOSYSTEMS Even though asymmetric cryptosystems are relatively secure, there are a few issues that do not guarantee the complete safety and invulnerability of these kinds of cryptosystems. One of the main problems in public-key cryptography is to prove that the public key is authentic, i.e., it has not been replaced with another key by a malicious user. There are two main approaches to address this problem. The first approach relies on a third party, which acts as a certificate authority that certifies the ownership of key. The other approach is the “web of trust” to which a user has access through a password [2]. As any other cryptosystem, the asymmetric one is vulnerable to brute-force attacks. However, with a large enough key, the exhaustive search attack is not practical, and therefore, this type of weakness can be reduced by enlarging the size of the key [2]. The other method of distributing private key of an asymmetric cryptosystem is through the key translation center which acts as a trusted server between parties that do not directly share the key between them. Each party shares a different key with the key translation center. The way this sharing information works is that one person sends an encrypted message to the trusted server using its own 211
  • 4. International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), Volume 4, Issue 6, November - December (2013) key, and the center translates it to the message that can be decrypted using the other party’s key. To accomplish this, the key transfer center maintains a secure database of users’ secret keys [3]. Another example of systems implicitly guaranteeing authenticity is the system using selfcertified public keys, which is exactly the same as the identity-based public key with the exception that the manipulations of the public key are done by the individual user rather than the trusted third party [3]. CONCLUSION Asymmetric cryptosystems have become a popular way of encrypting data since their first appearance in the 1970s. The main reason for development of these types of cryptosystems lies in the security of key management and the vulnerability under malicious attacks. The asymmetric cryptosystem contains a pair of keys, an encryption key, which is available to public, and a decryption key, which is private. REFERENCES [1] Mao, W., Modern Cryptography: Theory & Practice, Upper Saddle River, NJ: Prentice Hall PTR, 2004. [2] “Public-key cryptography,” Wikipedia, <http://en.wikipedia.org/wiki/Public-key cryptography> [3] Menezes, A., van Oorschot, P., and Vanstone, S. Handbook of applied cryptography, CRC Press, 1996. [4] “RSA algorithm,” <http://www.dimgt.com.au/rsa alg.html> [5] “RSA cryptosystem,” <http://ww3.algorithmdesign.net/handouts/RSA.pdf> [6] “Rabin cryptosystems,” Wikipedia, <http://en.wikipedia.org/wiki/Rabin cryptosystem> [7] N. R. Wagner, The laws of cryptography: Rabin’s version of RSA, <http://www.cs.utsa.edu/ wagner/laws/Rabin.html> [8] “ElGamal encryption,” Wikipedia, <http://en.wikipedia.org/wiki/ElGamal encryption> [9] “Diffie-Hellman key exchange,” Wikipedia, <http://en.wikipedia.org/wiki/Diffie-Hellman key exchange> [10] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using Reconfigurable Hardware”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [11] Varun Shukla and Abhishek Choubey, “A Comparative Analysis of the Possible Attacks on RSA Cryptosystem”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 1, 2012, pp. 92 - 97, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. 212