SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online),
INTERNATIONAL JOURNAL OF MANAGEMENT (IJM)
Volume 4, Issue 6, November - December (2013)
ISSN 0976-6502 (Print)
ISSN 0976-6510 (Online)
Volume 4, Issue 6, November - December (2013), pp. 209-212
© IAEME: www.iaeme.com/ijm.asp
Journal Impact Factor (2013): 6.9071 (Calculated by GISI)
www.jifactor.com

IJM
©IAEME

DISTINGUISH FROM SYMMETRIC AND ASYMMETRIC CRYPTO
SYSTEMS. CITE THE STRENGTHS AND SHORTCOMINGS OF THE EACH
SYSTEM
V. Sridevi1, V. Sumathi2 and M. Guru Prasad3
1

2

Department of Biotechnology, Sri Venkateswara University, Tirupati, A.P
Department of Biotechnology, Sri Padmavati Mahila Visvavidyalayam, Tirupati, A.P.
3
Department of Biochemistry, Bharatiyar University, Coimbatore, Chennai.

ABSTRACT
In a symmetric cipher, both parties must use the same key for encryption and decryption.
This means that the encryption key must be shared between the two parties before any messages can
be decrypted. Symmetric systems are also known as shared secret systems or private key systems.
Symmetric ciphers are significantly faster than asymmetric ciphers, but the requirements for key
exchange make them difficult to use. In an asymmetric cipher, the encryption key and the decryption
keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is
shared publicly. The second key, the private key, should never be shared with anyone.When you
send a message using asymmetric cryptography, you encrypt the message using the recipients public
key. The recipient then decrypts the message using his private key. That is why the system is called
asymmetric. Because asymmetric ciphers tend to be significantly more computationally intensive,
they are usually used in combination with symmetric ciphers to implement effect public key
cryptography. The asymmetric cipher is used to encrypt a session key and the encrypted session key
is then used to encrypt the actual message. This gives the key-exchange benefits of asymmetric
ciphers with the speed of symmetric ciphers.
1. INTRODUCTION
Throughout the history of cryptography, hundreds of cryptosystems have been developed.
The earliest ones, as well as many later ones, relied on the complete secrecy in transferring keys
between the sender and recipient. These kinds of systems, called secret key cryptosystem, have just a
single key which is used for both encryption and decryption; therefore, these systems are more
frequently known as symmetric cryptosystems. In contrast to a symmetric cryptosystem, an
asymmetric cryptosystem is associated with a pair of keys; therefore, not everything related to the
cryptosystem needs to be kept secret. This kind of a cryptosystem is also called public-key
209
International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online),
Volume 4, Issue 6, November - December (2013)

cryptosystem. A public key cryptosystem consists of a public key, which is used for encryption, and
a private key, used for decryption. Therefore, anybody can encrypt plaintext since the encryption key
is available to everyone, but only the holders of the private key corresponding to the public key used
for encryption can decrypt the ciphertext [1, 2].
The first asymmetric cryptosystems appeared in 1970s to address the problem of key
management in symmetric cryptography. In 1976, Whitfield Diffie and Martin Hellman published a
key management scheme that was the predecessor to the first public-key cryptosystems; it later
became known as the Diffie-Hellman Key Exchange Protocol. Later, several asymmetric
cryptosystems were developed, including ElGamal, Rabin, and RSA cryptosystems [6,2,1].
The public-key cryptosystems rely heavily on mathematical functions known as trapdoor
functions; these are easy to apply in one direction but extremely difficult to apply in the inverse,
which is required for decryption of the ciphertext [1]. The major difference between the main
asymmetric cryptosystems is the function used to produce the public key. Many of them rely on
factoring a large number into two large prime numbers that compose the given number. This is not a
trivial task, especially when each of the primes generally have more than 100 digits, which is usually
the case in well-designed cryptosystems.
However, there are other mechanisms used to derive public keys that we will briefly explain
in the following sections.
1.1 The Diffie-Hellman Key Exchange Protocol
The Diffie-Hellman Key Exchange Protocol, often shortened to simply Diffie-Hellman, was
invented in 1976 through the collaboration of Whitfield Diffie and Martin Hellman ([9], [1]). DiffieHellman is not a cryptosystem; rather, it is a means for two parties to jointly produce a shared secret
key over an insecure communications channel with minimal risk of a third party obtaining the key. In
fact, Diffie-Hellman was the first such method. Diffie-Hellman accomplishes this by taking
advantage of the properties of multiplicative groups of integers modulo that is, Zon. Specifically, we
select a prime number for, the modulo value of the group, and we select a prime number as the
generator of the group. These two conditions ensure that Zon will always be a cyclic group this is the
property needed for Diffie-Hellman to work as expected.
The key to Diffie-Hellman, of course, is that Alice and Bob end up with the same shared
secret key in steps 4 and 5 of the above algorithm. This shared secret can be used to establish a
secure communications channel. Considering this allows us to understand that the Diffie-Hellman
Key Exchange Protocol is an excellent tool that can be used to securely establish a secure
communications channel when only insecure means of communication are available.
1.2 ElGamal
The ElGamal encryption system was developed by Taher Elgamal in 1984 ([8], [1]). It is
based heavily on the same principle as Diffie-Hellman: a cyclic multiplicative group modulo some
prime number.
Generally speaking, of course, the number of possible messages will far exceed p − 1. To
remedy this, ElGamal is generally used multiple times on several pieces of the message. One obvious
disadvantage of ElGamal, consequently, is that any ciphertext generated using ElGamal is twice as
large as the plaintext.
Another disadvantage is that p−1 must generally be larger than the number of possible
messages, simply because this number is unlikely to be prime.
It is easy to verify that ElGamal is indeed a valid cryptosystem: cx1
´ (gk)x ´ (gx)k ´ yk ´c2/m (mod p).

210
International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online),
Volume 4, Issue 6, November - December (2013)

1.3 Rabin Cryptosystem
The Rabin cryptosystem is another example of an asymmetric cryptosystem. It was created
by Michael O. Rabin in 1979. Rabin’s work has theoretical importance because it provided the first
provable security for public-key cryptosystems [6]. It can be proven that recovering the entire
plaintext from the ciphertext has same complexity as factoring large numbers [1,7].
The effectiveness of this algorithm has been questioned mainly because of the fact that it produces 4
results, one correct and 3 false. Identifying the correct one is usually performed with a guess. If the
plaintext is intended to represent a text message, guessing is not difficult; however, if the plaintext is
intended to represent a numerical value, this issue becomes a problem that must be solved with some
kind of disambiguation scheme. It is possible to choose plaintexts with special structures, or to add
padding, to eliminate this problem. The most common way of implementing disambiguation is
known as Blum disambiguation, which is based on characteristics of pseudorandom number
generator [6].
The efficiency of the Rabin cryptosystem is at least as good as that of the RSA cryptosystem.
In Rabin, encryption is computed by calculating a square modulon. This is more efficient than RSA,
which requires the calculation of at least a cube. For decryption, the results of congruence are applied
through the Chinese remainder theorem, along with two modular exponentiations. Here the
efficiency is comparable to RSA. Disambiguation introduces additional computational costs, which
is the main reason preventing the Rabin cryptosystem from finding widespread practical use.
1.4 RSA
RSA is the most commonly used cryptosystem these days. It was invented in 1977 by Ron
Rivest, Adi Shamir, and Len Adleman, where the name RSA comes from [4].The most important
part of asymmetric algorithms is the key generation.
The security of RSA is based on difficulty of factoring large prime numbers. Therefore, the
choice of primes is very crucial, which raises the biggest issue. The problem with sufficiently large
primes is to check their primality, to compute gcd(e, Á(n)) to make sure they are relatively prime,
and to compute the private key d satisfying ed ´ 1 (mod Á(n)). There are several algorithms that can
speed up some calculations required for encryption and decryption of a message using the RSA
algorithm, which make this cryptosystem very likely to be used these days for transmitting secure
information ([4], [5]).
2. WEAKNESSES IN ASYMMETRIC CRYPTOSYSTEMS
Even though asymmetric cryptosystems are relatively secure, there are a few issues that do
not guarantee the complete safety and invulnerability of these kinds of cryptosystems. One of the
main problems in public-key cryptography is to prove that the public key is authentic, i.e., it has not
been replaced with another key by a malicious user. There are two main approaches to address this
problem. The first approach relies on a third party, which acts as a certificate authority that certifies
the ownership of key. The other approach is the “web of trust” to which a user has access through a
password [2].
As any other cryptosystem, the asymmetric one is vulnerable to brute-force attacks. However,
with a large enough key, the exhaustive search attack is not practical, and therefore, this type of
weakness can be reduced by enlarging the size of the key [2].
The other method of distributing private key of an asymmetric cryptosystem is through the
key translation center which acts as a trusted server between parties that do not directly share the key
between them. Each party shares a different key with the key translation center. The way this sharing
information works is that one person sends an encrypted message to the trusted server using its own

211
International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online),
Volume 4, Issue 6, November - December (2013)

key, and the center translates it to the message that can be decrypted using the other party’s key. To
accomplish this, the key transfer center maintains a secure database of users’ secret keys [3].
Another example of systems implicitly guaranteeing authenticity is the system using selfcertified public keys, which is exactly the same as the identity-based public key with the exception
that the manipulations of the public key are done by the individual user rather than the trusted third
party [3].
CONCLUSION
Asymmetric cryptosystems have become a popular way of encrypting data since their first
appearance in the 1970s. The main reason for development of these types of cryptosystems lies in the
security of key management and the vulnerability under malicious attacks. The asymmetric
cryptosystem contains a pair of keys, an encryption key, which is available to public, and a
decryption key, which is private.
REFERENCES
[1]

Mao, W., Modern Cryptography: Theory & Practice, Upper Saddle River, NJ: Prentice Hall
PTR, 2004.
[2] “Public-key cryptography,” Wikipedia,
<http://en.wikipedia.org/wiki/Public-key cryptography>
[3] Menezes, A., van Oorschot, P., and Vanstone, S. Handbook of applied cryptography, CRC
Press, 1996.
[4] “RSA algorithm,” <http://www.dimgt.com.au/rsa alg.html>
[5] “RSA cryptosystem,” <http://ww3.algorithmdesign.net/handouts/RSA.pdf>
[6] “Rabin cryptosystems,” Wikipedia, <http://en.wikipedia.org/wiki/Rabin cryptosystem>
[7] N. R. Wagner, The laws of cryptography: Rabin’s version of RSA,
<http://www.cs.utsa.edu/ wagner/laws/Rabin.html>
[8] “ElGamal encryption,” Wikipedia, <http://en.wikipedia.org/wiki/ElGamal encryption>
[9] “Diffie-Hellman key exchange,” Wikipedia,
<http://en.wikipedia.org/wiki/Diffie-Hellman key exchange>
[10] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using
Reconfigurable Hardware”, International Journal of Computer Engineering & Technology
(IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.
[11] Varun Shukla and Abhishek Choubey, “A Comparative Analysis of the Possible Attacks on
RSA Cryptosystem”, International Journal of Electronics and Communication Engineering
& Technology (IJECET), Volume 3, Issue 1, 2012, pp. 92 - 97, ISSN Print: 0976- 6464,
ISSN Online: 0976 –6472.

212

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
Aaron Zauner
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
 

Was ist angesagt? (15)

Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Ch9
Ch9Ch9
Ch9
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017
 

Andere mochten auch

30120130406024
3012013040602430120130406024
30120130406024
IAEME Publication
 

Andere mochten auch (8)

20320130406032
2032013040603220320130406032
20320130406032
 
50120130406038
5012013040603850120130406038
50120130406038
 
1. tutorial unity3d introducción
1.  tutorial unity3d introducción1.  tutorial unity3d introducción
1. tutorial unity3d introducción
 
30120130406024
3012013040602430120130406024
30120130406024
 
30120130406022
3012013040602230120130406022
30120130406022
 
Työmarkkinapoliittinen mielipideilmasto 2012
Työmarkkinapoliittinen mielipideilmasto 2012Työmarkkinapoliittinen mielipideilmasto 2012
Työmarkkinapoliittinen mielipideilmasto 2012
 
2. tutorial unity3d-disparo
2.  tutorial unity3d-disparo2.  tutorial unity3d-disparo
2. tutorial unity3d-disparo
 
20320130406020 2
20320130406020 220320130406020 2
20320130406020 2
 

Ähnlich wie 10120130406026

Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
SecurityTube.Net
 

Ähnlich wie 10120130406026 (20)

H42063743
H42063743H42063743
H42063743
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
 
Nt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm PaperNt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm Paper
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
A Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA VariantsA Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA Variants
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud ComputingIRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
cryptography
cryptographycryptography
cryptography
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
Unit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptxUnit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptx
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
 

Mehr von IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Kürzlich hochgeladen (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 

10120130406026

  • 1. International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), INTERNATIONAL JOURNAL OF MANAGEMENT (IJM) Volume 4, Issue 6, November - December (2013) ISSN 0976-6502 (Print) ISSN 0976-6510 (Online) Volume 4, Issue 6, November - December (2013), pp. 209-212 © IAEME: www.iaeme.com/ijm.asp Journal Impact Factor (2013): 6.9071 (Calculated by GISI) www.jifactor.com IJM ©IAEME DISTINGUISH FROM SYMMETRIC AND ASYMMETRIC CRYPTO SYSTEMS. CITE THE STRENGTHS AND SHORTCOMINGS OF THE EACH SYSTEM V. Sridevi1, V. Sumathi2 and M. Guru Prasad3 1 2 Department of Biotechnology, Sri Venkateswara University, Tirupati, A.P Department of Biotechnology, Sri Padmavati Mahila Visvavidyalayam, Tirupati, A.P. 3 Department of Biochemistry, Bharatiyar University, Coimbatore, Chennai. ABSTRACT In a symmetric cipher, both parties must use the same key for encryption and decryption. This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems. Symmetric ciphers are significantly faster than asymmetric ciphers, but the requirements for key exchange make them difficult to use. In an asymmetric cipher, the encryption key and the decryption keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is shared publicly. The second key, the private key, should never be shared with anyone.When you send a message using asymmetric cryptography, you encrypt the message using the recipients public key. The recipient then decrypts the message using his private key. That is why the system is called asymmetric. Because asymmetric ciphers tend to be significantly more computationally intensive, they are usually used in combination with symmetric ciphers to implement effect public key cryptography. The asymmetric cipher is used to encrypt a session key and the encrypted session key is then used to encrypt the actual message. This gives the key-exchange benefits of asymmetric ciphers with the speed of symmetric ciphers. 1. INTRODUCTION Throughout the history of cryptography, hundreds of cryptosystems have been developed. The earliest ones, as well as many later ones, relied on the complete secrecy in transferring keys between the sender and recipient. These kinds of systems, called secret key cryptosystem, have just a single key which is used for both encryption and decryption; therefore, these systems are more frequently known as symmetric cryptosystems. In contrast to a symmetric cryptosystem, an asymmetric cryptosystem is associated with a pair of keys; therefore, not everything related to the cryptosystem needs to be kept secret. This kind of a cryptosystem is also called public-key 209
  • 2. International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), Volume 4, Issue 6, November - December (2013) cryptosystem. A public key cryptosystem consists of a public key, which is used for encryption, and a private key, used for decryption. Therefore, anybody can encrypt plaintext since the encryption key is available to everyone, but only the holders of the private key corresponding to the public key used for encryption can decrypt the ciphertext [1, 2]. The first asymmetric cryptosystems appeared in 1970s to address the problem of key management in symmetric cryptography. In 1976, Whitfield Diffie and Martin Hellman published a key management scheme that was the predecessor to the first public-key cryptosystems; it later became known as the Diffie-Hellman Key Exchange Protocol. Later, several asymmetric cryptosystems were developed, including ElGamal, Rabin, and RSA cryptosystems [6,2,1]. The public-key cryptosystems rely heavily on mathematical functions known as trapdoor functions; these are easy to apply in one direction but extremely difficult to apply in the inverse, which is required for decryption of the ciphertext [1]. The major difference between the main asymmetric cryptosystems is the function used to produce the public key. Many of them rely on factoring a large number into two large prime numbers that compose the given number. This is not a trivial task, especially when each of the primes generally have more than 100 digits, which is usually the case in well-designed cryptosystems. However, there are other mechanisms used to derive public keys that we will briefly explain in the following sections. 1.1 The Diffie-Hellman Key Exchange Protocol The Diffie-Hellman Key Exchange Protocol, often shortened to simply Diffie-Hellman, was invented in 1976 through the collaboration of Whitfield Diffie and Martin Hellman ([9], [1]). DiffieHellman is not a cryptosystem; rather, it is a means for two parties to jointly produce a shared secret key over an insecure communications channel with minimal risk of a third party obtaining the key. In fact, Diffie-Hellman was the first such method. Diffie-Hellman accomplishes this by taking advantage of the properties of multiplicative groups of integers modulo that is, Zon. Specifically, we select a prime number for, the modulo value of the group, and we select a prime number as the generator of the group. These two conditions ensure that Zon will always be a cyclic group this is the property needed for Diffie-Hellman to work as expected. The key to Diffie-Hellman, of course, is that Alice and Bob end up with the same shared secret key in steps 4 and 5 of the above algorithm. This shared secret can be used to establish a secure communications channel. Considering this allows us to understand that the Diffie-Hellman Key Exchange Protocol is an excellent tool that can be used to securely establish a secure communications channel when only insecure means of communication are available. 1.2 ElGamal The ElGamal encryption system was developed by Taher Elgamal in 1984 ([8], [1]). It is based heavily on the same principle as Diffie-Hellman: a cyclic multiplicative group modulo some prime number. Generally speaking, of course, the number of possible messages will far exceed p − 1. To remedy this, ElGamal is generally used multiple times on several pieces of the message. One obvious disadvantage of ElGamal, consequently, is that any ciphertext generated using ElGamal is twice as large as the plaintext. Another disadvantage is that p−1 must generally be larger than the number of possible messages, simply because this number is unlikely to be prime. It is easy to verify that ElGamal is indeed a valid cryptosystem: cx1 ´ (gk)x ´ (gx)k ´ yk ´c2/m (mod p). 210
  • 3. International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), Volume 4, Issue 6, November - December (2013) 1.3 Rabin Cryptosystem The Rabin cryptosystem is another example of an asymmetric cryptosystem. It was created by Michael O. Rabin in 1979. Rabin’s work has theoretical importance because it provided the first provable security for public-key cryptosystems [6]. It can be proven that recovering the entire plaintext from the ciphertext has same complexity as factoring large numbers [1,7]. The effectiveness of this algorithm has been questioned mainly because of the fact that it produces 4 results, one correct and 3 false. Identifying the correct one is usually performed with a guess. If the plaintext is intended to represent a text message, guessing is not difficult; however, if the plaintext is intended to represent a numerical value, this issue becomes a problem that must be solved with some kind of disambiguation scheme. It is possible to choose plaintexts with special structures, or to add padding, to eliminate this problem. The most common way of implementing disambiguation is known as Blum disambiguation, which is based on characteristics of pseudorandom number generator [6]. The efficiency of the Rabin cryptosystem is at least as good as that of the RSA cryptosystem. In Rabin, encryption is computed by calculating a square modulon. This is more efficient than RSA, which requires the calculation of at least a cube. For decryption, the results of congruence are applied through the Chinese remainder theorem, along with two modular exponentiations. Here the efficiency is comparable to RSA. Disambiguation introduces additional computational costs, which is the main reason preventing the Rabin cryptosystem from finding widespread practical use. 1.4 RSA RSA is the most commonly used cryptosystem these days. It was invented in 1977 by Ron Rivest, Adi Shamir, and Len Adleman, where the name RSA comes from [4].The most important part of asymmetric algorithms is the key generation. The security of RSA is based on difficulty of factoring large prime numbers. Therefore, the choice of primes is very crucial, which raises the biggest issue. The problem with sufficiently large primes is to check their primality, to compute gcd(e, Á(n)) to make sure they are relatively prime, and to compute the private key d satisfying ed ´ 1 (mod Á(n)). There are several algorithms that can speed up some calculations required for encryption and decryption of a message using the RSA algorithm, which make this cryptosystem very likely to be used these days for transmitting secure information ([4], [5]). 2. WEAKNESSES IN ASYMMETRIC CRYPTOSYSTEMS Even though asymmetric cryptosystems are relatively secure, there are a few issues that do not guarantee the complete safety and invulnerability of these kinds of cryptosystems. One of the main problems in public-key cryptography is to prove that the public key is authentic, i.e., it has not been replaced with another key by a malicious user. There are two main approaches to address this problem. The first approach relies on a third party, which acts as a certificate authority that certifies the ownership of key. The other approach is the “web of trust” to which a user has access through a password [2]. As any other cryptosystem, the asymmetric one is vulnerable to brute-force attacks. However, with a large enough key, the exhaustive search attack is not practical, and therefore, this type of weakness can be reduced by enlarging the size of the key [2]. The other method of distributing private key of an asymmetric cryptosystem is through the key translation center which acts as a trusted server between parties that do not directly share the key between them. Each party shares a different key with the key translation center. The way this sharing information works is that one person sends an encrypted message to the trusted server using its own 211
  • 4. International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), Volume 4, Issue 6, November - December (2013) key, and the center translates it to the message that can be decrypted using the other party’s key. To accomplish this, the key transfer center maintains a secure database of users’ secret keys [3]. Another example of systems implicitly guaranteeing authenticity is the system using selfcertified public keys, which is exactly the same as the identity-based public key with the exception that the manipulations of the public key are done by the individual user rather than the trusted third party [3]. CONCLUSION Asymmetric cryptosystems have become a popular way of encrypting data since their first appearance in the 1970s. The main reason for development of these types of cryptosystems lies in the security of key management and the vulnerability under malicious attacks. The asymmetric cryptosystem contains a pair of keys, an encryption key, which is available to public, and a decryption key, which is private. REFERENCES [1] Mao, W., Modern Cryptography: Theory & Practice, Upper Saddle River, NJ: Prentice Hall PTR, 2004. [2] “Public-key cryptography,” Wikipedia, <http://en.wikipedia.org/wiki/Public-key cryptography> [3] Menezes, A., van Oorschot, P., and Vanstone, S. Handbook of applied cryptography, CRC Press, 1996. [4] “RSA algorithm,” <http://www.dimgt.com.au/rsa alg.html> [5] “RSA cryptosystem,” <http://ww3.algorithmdesign.net/handouts/RSA.pdf> [6] “Rabin cryptosystems,” Wikipedia, <http://en.wikipedia.org/wiki/Rabin cryptosystem> [7] N. R. Wagner, The laws of cryptography: Rabin’s version of RSA, <http://www.cs.utsa.edu/ wagner/laws/Rabin.html> [8] “ElGamal encryption,” Wikipedia, <http://en.wikipedia.org/wiki/ElGamal encryption> [9] “Diffie-Hellman key exchange,” Wikipedia, <http://en.wikipedia.org/wiki/Diffie-Hellman key exchange> [10] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using Reconfigurable Hardware”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [11] Varun Shukla and Abhishek Choubey, “A Comparative Analysis of the Possible Attacks on RSA Cryptosystem”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 1, 2012, pp. 92 - 97, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. 212