SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 191 
COMPARATIVE STUDY OF PRIVATE AND PUBLIC KEY CRYPTOGRAPHY ALGORITHMS: A SURVEY Priti Bali1 1Assistant Professor, Computer Science Department, D.A.V. Institute of Management, Haryana, India Abstract Internet has revolutionized many aspects of our daily lives. Nowadays Internet is used for millions of applications. Many people depend on Internet for several activities like on-line banking, on-line shopping, on-line learning and on-line meetings etc. Huge amount of data travels over the network. Security of data over the network is a critical issue. Making a network secure involves a lot more than just keeping it free from programming errors. Network Security refers to the protection of valuable data against Interception, Interruption, Modification, Fabrication and Non-repudiation. Computer networks are inherently insecure so to protect data over the networks we need some mechanism. Cryptography came into existence to ensure data security. There are various threats to data: Backdoors, denial-of-service attack, direct-access attack, eavesdropping, exploits, indirect-attacks and social engineering and human-error. Cryptography provides protection against security threats. Cryptography means secret writing, the content of original text is scrambled to produce coded text and job of intruders becomes difficult. Secret-writing is the strongest tool of cryptography which protects the data. Cryptography is used to ensure confidentiality, integrity and availability of data by using private and public key cryptography algorithms. Private and Public key algorithms are used to transform original (readable) messages into unreadable jumbles. This paper describes the comparison of Private (symmetric) and Public (asymmetric) key algorithms. Keywords: Plain Text, Cipher Text, Key, Encryption, Decryption, Intruder, Cryptanalysis, Cryptology, Cryptosystem, Cryptography, DES, RSA. 
--------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Use of Internet is growing rapidly. So, providing security to the data over networks has become a critical issue nowadays. Data over networks is insecure; it should be disclosed only to the intended recipients not to everyone. Data is more prone to attacks while transmitting in the network. Cryptography came into existence to provide solutions to all the issues of network security. Cryptography provides security to data while it is in network. It makes the messages immune to various attacks by converting the original message into coded message. Encryption is a process which is used for converting the original message into disguised message at the sender end. Various cryptography algorithms (private and public) are available which are used for concealing the content of message from all except the sender and the receiver. 1.1 Basic concepts of Cryptography Plain text: Plain text is the message that a person wants to communicate. It is the original message which is to be encrypted at the sender end. Cipher text: Cipher text is the message that is not comprehensible to anyone. It is the coded message which is to be decrypted at the receiving end. Intruders: Intruders alter the message with wrong intentions. Intruders intercept, interrupt and fabricate the original messages and send their own disguised messages. 
Encryption: Encryption is the process of converting Plain text into Cipher text. It requires Encryption algorithm and a key. The best method for protecting the confidentiality of information transmitted over wireless networks is to encrypt all wireless traffic. The most effective way to secure wireless network from intruders is to encrypt, or scramble, or disguise, communications over the network. Most wireless routers and access points have a built-in encryption mechanism [1]. Decryption: decryption is the process of converting Cipher text into plain text. It requires Decryption algorithm and a key. Key: Key operates on the plain text and converts it into cipher text. The real secrecy of cryptography is in the key. It is used for both processes: Encryption Process and Decryption Process. Key could be a number, function or an algorithm. Keys perform the transformations. For example: ABC (plain text) becomes DEF (cipher text) by applying a key. (The key is: shift all the letters by 3) Cryptanalysis: Cryptanalysis means “code breaking”. Art of breaking cipher text is known as cryptanalysis. Cryptology: The art of formulating ciphers (cryptography) and breaking ciphers (cryptanalysis) is collectively known as cryptology.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 192 
Cryptography: Cryptography means “code making”, it is a process of converting plain text (original message) into cipher text (coded message). This message transformation is done to make messages secure and immune to attacks over the network. Cryptosystem: The system which is used to implement cryptography is known as cryptosystem. 1.2 Cryptography provides Protection against the following Security Threats: Interception: Interception happens when an unauthorized user gain access to valuable data. In this case, the protection is aimed to ensure confidentiality of the data. Interruption: Interruption happens when data become unavailable, unusable or destroyed. In this case, the protection is aimed to ensure availability of data. Modification: Modification means some unauthorized user has altered the data. In this case, the protection is aimed to ensure integrity of data. Fabrication: Fabrication happens when an unauthorized person inserts forged data in a file. In this case, the protection is aimed to ensure authenticity of data. Non-Repudiation: Non-Repudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message. Non-Repudiation can be achieved by the use of digital signatures, confirmation services, time stamps and unique biometric information [2]. Cryptography is used for controlling all the security threats. Secret-writing (coded/cipher text) is the strongest tool because well-disguised data cannot be read, modified and fabricated easily. Different types of algorithms are used for converting Plain text (original message) into Cipher text (coded message). 1.3 Cryptography Algorithms can be classified into Two Categories: 
 Private key cryptography algorithms 
 Public key cryptography algorithms 
1.3.1 Private Key Cryptography Algorithms: Private Key algorithms are also known as symmetric key algorithms. In symmetric key algorithms, encryption and decryption processes are performed using the same key. It is also known as conventional encryption and decryption [3]. In private key algorithms, encryption and decryption keys are mathematically related (usually inverse of each other). Private key algorithms are efficient and take less time to encrypt messages. These algorithms are used to encrypt and decrypt long messages because size of key is small. 
1.3.2 Public Key Cryptography Algorithms 
Public key algorithms are basically used for key distribution. Public key algorithms are also known as asymmetric key algorithms. In asymmetric key algorithms two keys are used: A private key and a public key. Public key is used for encryption and private key is used for decryption. Public key is known to public and private key is only known to user. So there is no need to distribute the keys before transmission [4]. In this type of algorithms it is very difficult to derive one key from the other (means decryption key is very difficult to derive from the encryption key). In asymmetric algorithms, public keys are used to encrypt the message and private keys are used to decrypt the message. 2. DES (DATA ENCRYPTION STANDARD) DES was designed by IBM in 1977. DES is a Private (symmetric) key cryptography algorithm. In DES, size of input block is 64-bits and key is 56-bits long. Same key is used for encryption and decryption. DES comprises various operations: mixing of bits, substitution, exclusive OR, S- boxes, straight permutation and expansion permutation [5]. Structure of DES algorithm: 
[6] Source: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Steps involved in DES algorithm are: 
(i) Inputs of DES are 64-bits plain text and 56-bits key. Output of DES is 64-bits cipher text. In DES,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 193 
block of plain text is converted into block of cipher text. 
(ii) Processing of block: Transposition is applied to 64- bits plain text. This process is called keyless initial permutation. 
(iii) Processing of key: 64-bits key provided by the user is reduced to 56-bits by removing the parity bits (8, 16, 24, 32, 40, 48, 56 and 64). Split the key into two halves of 28-bits each. After this, circular left shifts are applied on both halves. Then by applying compression permutation 56-bits key is reduced to 48-bits. This 48-bits key is used for encryption. This component is called key processor sub component. It provides different set of 48-bits for 16 rounds means all the 16 complex round ciphers use a different key derived from the original key. 
(iv) Split the block produced in step (ii) into two halves of 32-bits each. 
(v) Expansion permutation is applied to one half to increase its size to 48-bits. 
(vi) XOR operation is applied to 48-bits of plain text produced in step (v) and 48-bits fetched from key processor sub component in step (iii). 
(vii) Output of step (vi) is fed into the S-box which reduces the 48-bits block into 32-bits block. 
(viii) Output of step (vii) is subjected to straight permutation for changing the order of bits. 
(ix) Again XOR operation is applied to the output of step (viii) and other half of the block produced in step (iv). 
(x) The two data halves are then swapped and become the input for the next round 
(xi) Cipher text is obtained after completing 16 rounds and by applying final permutation (reverse of initial permutation) [7]. 
For decryption, same process is used but in reverse order. DES algorithm is widely used for better security. Security depends heavily on S-boxes. 3. RSA (RIVEST, SHAMIR, ADLEMAN) ALGORITHM: RSA was discovered in 1978. RSA is a Public (asymmetric) key cryptography algorithm; it is named after the initials of its discoveres, Ron Rivest, Adi Shamir and Len Adelman in 1977. It is the most popular asymmetric key cryptographic algorithm which is used to provide both secrecy and digital signature. It uses the prime numbers to generate public and private keys based on mathematical calculations and multiplying large numbers together [8]. Steps involved in RSA algorithm are generation of public and Private keys, Encryption Process, Decryption Process. Generation of Public and Private Keys Following steps are used for generating keys: 
Choose any two prime numbers say p & q. (p & q cannot be divided by any other number except 1 and itself). Calculate n, n = p x q. Calculate another number Ø also known as Euler’s totient function. Value of Ø = (p-1) x (q-1). Now assume a number e such that d x e = 1 (mod Ø). The value of e should lie between 1 and Ø. Number e should be a prime number. Number e and Ø should be co-prime means e and Ø are not divisible by any other number except 1 or in other words g.c.d. of e and Ø should be 1. Now calculate the value of d by using extended Euclidean algorithm’s table method. After calculating the value of d, public keys (e and n) are announced to the public and private keys (d and Ø) are kept secret. Encryption process: Now anyone can send a message by using public keys (e and n). Plain text (Original message) is converted into Cipher text (scrambled message) by using the following formula: C = Pe (mod n) Decryption process: Cipher text is converted into Plain text by using private key d. Cipher text (scrambled message) is converted into Plain text (original message) by using the following formula: P = Cd (mod n) Modular exponentiation is used for Encryption and Decryption process. RSA algorithm requires complex computation and hence it is very slow. In Public key algorithms, the underlying modular exponentiation and factoring large numbers into prime numbers depend on multiplication and division, which are inherently slower and requires a lot of processing power. 4. COMPARISON OF PRIVATE AND PUBLIC KEY CRYPTOGRAPHIC ALGORITHMS: Conceptual comparison of DES and RSA: 
Factors 
DES (Private Key Algorithm) 
RSA (Public Key Algorithm) 
Message Length 
Suitable for long messages 
Suitable for short messages 
Data rate 
Fast 
Slow 
Requirement of memory space 
Less memory space required 
More memory space required 
Encryption Process 
Fast 
Slow 
Decryption Process 
Fast 
Slow 
Type of algorithm (or cryptography) 
Symmetric 
Asymmetric 
Speed of computation 
Fast 
Slow 
Complexity 
O(logN) 
O(N3) 
Security 
Moderate 
Highest 
Nature 
Closed 
Open
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 194 
Vulnerabilities (or weaknesses) 
Brute Forced, Linear and Differential cryptanalysis attack 
Brute Forced and Oracle attack 
Cause of vulnerability 
Weak key usage 
Weak 
Secure services 
Confidentiality 
Confidentiality, Integrity, Non- repudiation 
Job of intruder (or Hacker) 
Easy Deduction of key is based on guesses and knowledge of language. Key could be derived by Hit and trial or by recognizing patterns or by combination of guesses, strategy and mathematical skill. 
Difficult 
Block size 
64 bits 
Minimum 512 bits 
Power consumption 
Low 
High 
Rounds 
16 
1 
Throughput 
Very high 
Low 
Confidentiality 
High 
Low 
Software Implementation 
Fast (DES is at least 100 times faster than RSA) 
Slow 
Hardware Implementation 
Fast (DES is between 1,000 and 10,000 times faster (depending on the implementation) than RSA) 
Slow 
Encryption and Decryption algorithm 
Different 
Same 
Cryptanalysis method 
Differential method 
Product factorization 
Key-Based comparison of DES and RSA: 
Factors 
DES (Private Key Algorithm) 
RSA (Public Key Algorithm) 
Relationship between Encryption and Decryption Keys 
Encryption and Decryption keys are inverse of each other. P = D(K, E(K, P)) 
Encryption and Decryption keys come in pairs. P = D(KD, E(KE, P)) 
Derivation of Decryption key from Encryption key 
Easy 
Difficult (almost impossible) 
Key Distribution 
Problematic (not as popular as RSA) 
Simple (widely used for key distribution) 
Type of key 
Private or Secret 
Public 
Key Size 
56 bits 
>1024 bits 
Key 
Key transportation 
Key transportation is 
transportation (or transmission) 
is necessary because sender and receiver both use the same key. 
not necessary (the biggest advantage of public key cryptography is the secure nature of private key, it never needs to be transmitted or revealed). 
Sharing of key (or key exchange) 
Difficult (in the world of Internet, the communicating parties may never meet and converse except over the network so how do they share key and communicate). 
Simple (problem of key sharing can be solved by using RSA because it uses two keys: public and private. Public key is announced by the receiver and is available on the web page of receiver). 
Ways used for key sharing 
Telephone lines are used which are prone to eavesdropping. 
Public key is available on the web page of the receiver. Sender uses this public key to encrypt the message. 
Key disclosure 
Key is not disclosed publicly. 
Key is disclosed on the web. 
Key management 
Difficult 
Easy 
Key deposit 
Needed 
Needed 
Comparison of DES and RSA on the basis of Encryption and Decryption Time: 
S. No. 
Algorithm 
Packet Size (KB) 
Encryption Time (Sec) 
Decryption Time (Sec) 
1 
DES 
153 
3.0 
1 
RSA 
7.3 
4.9 
2 
DES 
118 
3.2 
1.2 
RSA 
10.0 
5.0 
3 
DES 
196 
2.0 
1.4 
RSA 
8.5 
5.9 
4 
DES 
312 
3.0 
1.6 
RSA 
7.8 
5.1 
5 
DES 
868 
4.0 
1.8 
RSA 
8.2 
5.1 
[9] Source: International Journal of Science and Research (IJSR) From the above table it is clear that RSA takes more time for Encryption and Decryption than DES. Hence, Public key algorithms are slower than Private Key algorithms. 5. CONCLUSIONS 
Security of any algorithm is highly based on the length of the key being used. Private and public key algorithms have their own advantages and disadvantages. Private key algorithms require less memory than Public key algorithms. Computation speed of Private key algorithms is much faster than Public key algorithms. Because of the amount of
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 195 
computations involved, Public key algorithms are very slow and are useful only for specialized tasks. Private key encryption is 10,000 times faster than the Public Key encryption because in Public Key algorithms, the underlying modular exponentiation and factoring large numbers into prime numbers depend on multiplication and division, which are inherently slower and requires a lot of processing power than the bit operations (addition, exclusive OR, substitution and transposition, shifting columns, shifting rows) on which Private key algorithms are based. Therefore, cryptographers use Private key algorithms for frequent tasks where slow operation is a major problem and Public key algorithms are reserved for specialized, infrequent uses, where slow operation is not a problem. Key distribution is simple in public key algorithms whereas it is complex in Private key algorithms. 
So, for providing better services, combination of Private and Public key algorithms can be used. Hybrid (means combination of Private and Public key algorithms) scheme can be used to provide better security in networks. For an instance, firstly use Public key algorithm for key distribution and then send data securely by using Private key algorithm. Public key algorithms are more often used as a solution to the key-management problem. For short messages, only public key algorithms can be used and for long messages, combination of Private and public key algorithms can be used for sending data securely. This combination of Private and Public key algorithms often capitalizes on the best features of each. REFERENCES [1]. Rosslin John Robles, Chang-hwa Hong, Tai-hoon Kim, “Wireless Network Security: Vulnerabilities, Threats and Countermeasures”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 3, No. 3, July, 2008. [2]. Mrs.V.Umadevi Chezhian, Dr. Ramar, Mr. Zaheer Uddin Khan, “Security Requirements in Mobile Ad Hoc Networks”, International Journal of Advanced Research in Computer and Communication Engineering, ISSN 2278 – 1021, Vol. 1, Issue 2, April 2012. [3]. Gurpreet Singh, Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”, International Journal of Computer Applications (0975 – 8887) Volume 67– No.19, April 2013. [4]. Dr. Prerna Mahajan, Abhishek Sachdeva, “A study of Encryption algorithms AES, DES and RSA for security”, Global Journal of Computer Science and Technology, Volume 13 Issue 15 Version 1.0 Year 2013. [5]. Dr. Sudesh Jakhar, Aman Kumar, Sunil Makkar, “Comparative Analysis between DES and RSA algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, ISSN: 2277 128X, July 2012. [6]. Shaymaa Mohammed Jawad Kadhim Manjusha Joshi, Dr. Shashank Joshi, “Provide the Security to a Web Service by using DES Cryptography Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, October 2013 ISSN: 2277 128X, figure2. 
[7]. Prashanti.G, Deepthi.S, Sandhya Rani.K, “A Novel Approach for Data Encryption Standard Algorithm”, International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Volume-2, Issue- 5, June 2013. [8]. Mohit Marwaha, Rajeev Bedi, “Comparative analysis of Cryptographic Algorithms”, International Journal of Advanced Engineering Technology, IV/III/July- Sept.,2013/16-18, E-ISSN 0976-3945. [9]. B. Padmavathi, S. Ranjitha Kumari, “A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique”, International Journal of Science and Research (IJSR) India Online ISSN: 2319-7064, Volume 2 Issue 4, April 2013, Table2. BIOGRAPHIE 
Priti Bali is working as an Assistant Professor in D.A.V. Institute of Management, Faridabad.

Weitere ähnliche Inhalte

Was ist angesagt?

10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
Arindam Paul
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
Sumit Bajaj
 

Was ist angesagt? (20)

Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODV
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
82 86
82 8682 86
82 86
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Securing Mobile Data using Cryptography
Securing Mobile Data using CryptographySecuring Mobile Data using Cryptography
Securing Mobile Data using Cryptography
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 

Andere mochten auch

Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
eSAT Publishing House
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...
eSAT Publishing House
 
Natural and calcined clayey diatomite as cement replacement materials microst...
Natural and calcined clayey diatomite as cement replacement materials microst...Natural and calcined clayey diatomite as cement replacement materials microst...
Natural and calcined clayey diatomite as cement replacement materials microst...
eSAT Publishing House
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
eSAT Publishing House
 

Andere mochten auch (20)

Proposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DESProposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DES
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
 
Cost effective failover clustering
Cost effective failover clusteringCost effective failover clustering
Cost effective failover clustering
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...
 
Integrated grid inverter with frequency control scheme for wind mill applicat...
Integrated grid inverter with frequency control scheme for wind mill applicat...Integrated grid inverter with frequency control scheme for wind mill applicat...
Integrated grid inverter with frequency control scheme for wind mill applicat...
 
Natural and calcined clayey diatomite as cement replacement materials microst...
Natural and calcined clayey diatomite as cement replacement materials microst...Natural and calcined clayey diatomite as cement replacement materials microst...
Natural and calcined clayey diatomite as cement replacement materials microst...
 
Study of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beamsStudy of fiber optic sensor using concrete beams
Study of fiber optic sensor using concrete beams
 
Td ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoderTd ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoder
 
Analysis of surface roughness on machining of al 5 cu
Analysis of surface roughness on machining of al 5 cuAnalysis of surface roughness on machining of al 5 cu
Analysis of surface roughness on machining of al 5 cu
 
Utilization of pulverized plastic in cement concrete as fine aggregate
Utilization of pulverized plastic in cement concrete as fine aggregateUtilization of pulverized plastic in cement concrete as fine aggregate
Utilization of pulverized plastic in cement concrete as fine aggregate
 
Effect of various process parameters on friction stir
Effect of various process parameters on friction stirEffect of various process parameters on friction stir
Effect of various process parameters on friction stir
 
A novel scheme for reliable multipath routing
A novel scheme for reliable multipath routingA novel scheme for reliable multipath routing
A novel scheme for reliable multipath routing
 
Behaviour of mine waste as reinforced soil
Behaviour of mine waste as reinforced soilBehaviour of mine waste as reinforced soil
Behaviour of mine waste as reinforced soil
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...
 
Productivity improvement through lean deployment &
Productivity improvement through lean deployment &Productivity improvement through lean deployment &
Productivity improvement through lean deployment &
 
Optimization of process parameter for stir casted
Optimization of process parameter for stir castedOptimization of process parameter for stir casted
Optimization of process parameter for stir casted
 
Design of 3 d rc frame on sloping ground
Design of 3 d rc frame on sloping groundDesign of 3 d rc frame on sloping ground
Design of 3 d rc frame on sloping ground
 

Ähnlich wie Comparative study of private and public key cryptography algorithms a survey

A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
eSAT Journals
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
eSAT Journals
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
 

Ähnlich wie Comparative study of private and public key cryptography algorithms a survey (20)

Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safe
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
Survey: Elliptic Curve Cryptography using Scalar Multiplication AlgorithmsSurvey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
 
Paper id 312201534
Paper id 312201534Paper id 312201534
Paper id 312201534
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
 

Mehr von eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

Mehr von eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Kürzlich hochgeladen

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 

Kürzlich hochgeladen (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 

Comparative study of private and public key cryptography algorithms a survey

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 191 COMPARATIVE STUDY OF PRIVATE AND PUBLIC KEY CRYPTOGRAPHY ALGORITHMS: A SURVEY Priti Bali1 1Assistant Professor, Computer Science Department, D.A.V. Institute of Management, Haryana, India Abstract Internet has revolutionized many aspects of our daily lives. Nowadays Internet is used for millions of applications. Many people depend on Internet for several activities like on-line banking, on-line shopping, on-line learning and on-line meetings etc. Huge amount of data travels over the network. Security of data over the network is a critical issue. Making a network secure involves a lot more than just keeping it free from programming errors. Network Security refers to the protection of valuable data against Interception, Interruption, Modification, Fabrication and Non-repudiation. Computer networks are inherently insecure so to protect data over the networks we need some mechanism. Cryptography came into existence to ensure data security. There are various threats to data: Backdoors, denial-of-service attack, direct-access attack, eavesdropping, exploits, indirect-attacks and social engineering and human-error. Cryptography provides protection against security threats. Cryptography means secret writing, the content of original text is scrambled to produce coded text and job of intruders becomes difficult. Secret-writing is the strongest tool of cryptography which protects the data. Cryptography is used to ensure confidentiality, integrity and availability of data by using private and public key cryptography algorithms. Private and Public key algorithms are used to transform original (readable) messages into unreadable jumbles. This paper describes the comparison of Private (symmetric) and Public (asymmetric) key algorithms. Keywords: Plain Text, Cipher Text, Key, Encryption, Decryption, Intruder, Cryptanalysis, Cryptology, Cryptosystem, Cryptography, DES, RSA. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Use of Internet is growing rapidly. So, providing security to the data over networks has become a critical issue nowadays. Data over networks is insecure; it should be disclosed only to the intended recipients not to everyone. Data is more prone to attacks while transmitting in the network. Cryptography came into existence to provide solutions to all the issues of network security. Cryptography provides security to data while it is in network. It makes the messages immune to various attacks by converting the original message into coded message. Encryption is a process which is used for converting the original message into disguised message at the sender end. Various cryptography algorithms (private and public) are available which are used for concealing the content of message from all except the sender and the receiver. 1.1 Basic concepts of Cryptography Plain text: Plain text is the message that a person wants to communicate. It is the original message which is to be encrypted at the sender end. Cipher text: Cipher text is the message that is not comprehensible to anyone. It is the coded message which is to be decrypted at the receiving end. Intruders: Intruders alter the message with wrong intentions. Intruders intercept, interrupt and fabricate the original messages and send their own disguised messages. Encryption: Encryption is the process of converting Plain text into Cipher text. It requires Encryption algorithm and a key. The best method for protecting the confidentiality of information transmitted over wireless networks is to encrypt all wireless traffic. The most effective way to secure wireless network from intruders is to encrypt, or scramble, or disguise, communications over the network. Most wireless routers and access points have a built-in encryption mechanism [1]. Decryption: decryption is the process of converting Cipher text into plain text. It requires Decryption algorithm and a key. Key: Key operates on the plain text and converts it into cipher text. The real secrecy of cryptography is in the key. It is used for both processes: Encryption Process and Decryption Process. Key could be a number, function or an algorithm. Keys perform the transformations. For example: ABC (plain text) becomes DEF (cipher text) by applying a key. (The key is: shift all the letters by 3) Cryptanalysis: Cryptanalysis means “code breaking”. Art of breaking cipher text is known as cryptanalysis. Cryptology: The art of formulating ciphers (cryptography) and breaking ciphers (cryptanalysis) is collectively known as cryptology.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 192 Cryptography: Cryptography means “code making”, it is a process of converting plain text (original message) into cipher text (coded message). This message transformation is done to make messages secure and immune to attacks over the network. Cryptosystem: The system which is used to implement cryptography is known as cryptosystem. 1.2 Cryptography provides Protection against the following Security Threats: Interception: Interception happens when an unauthorized user gain access to valuable data. In this case, the protection is aimed to ensure confidentiality of the data. Interruption: Interruption happens when data become unavailable, unusable or destroyed. In this case, the protection is aimed to ensure availability of data. Modification: Modification means some unauthorized user has altered the data. In this case, the protection is aimed to ensure integrity of data. Fabrication: Fabrication happens when an unauthorized person inserts forged data in a file. In this case, the protection is aimed to ensure authenticity of data. Non-Repudiation: Non-Repudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message. Non-Repudiation can be achieved by the use of digital signatures, confirmation services, time stamps and unique biometric information [2]. Cryptography is used for controlling all the security threats. Secret-writing (coded/cipher text) is the strongest tool because well-disguised data cannot be read, modified and fabricated easily. Different types of algorithms are used for converting Plain text (original message) into Cipher text (coded message). 1.3 Cryptography Algorithms can be classified into Two Categories:  Private key cryptography algorithms  Public key cryptography algorithms 1.3.1 Private Key Cryptography Algorithms: Private Key algorithms are also known as symmetric key algorithms. In symmetric key algorithms, encryption and decryption processes are performed using the same key. It is also known as conventional encryption and decryption [3]. In private key algorithms, encryption and decryption keys are mathematically related (usually inverse of each other). Private key algorithms are efficient and take less time to encrypt messages. These algorithms are used to encrypt and decrypt long messages because size of key is small. 1.3.2 Public Key Cryptography Algorithms Public key algorithms are basically used for key distribution. Public key algorithms are also known as asymmetric key algorithms. In asymmetric key algorithms two keys are used: A private key and a public key. Public key is used for encryption and private key is used for decryption. Public key is known to public and private key is only known to user. So there is no need to distribute the keys before transmission [4]. In this type of algorithms it is very difficult to derive one key from the other (means decryption key is very difficult to derive from the encryption key). In asymmetric algorithms, public keys are used to encrypt the message and private keys are used to decrypt the message. 2. DES (DATA ENCRYPTION STANDARD) DES was designed by IBM in 1977. DES is a Private (symmetric) key cryptography algorithm. In DES, size of input block is 64-bits and key is 56-bits long. Same key is used for encryption and decryption. DES comprises various operations: mixing of bits, substitution, exclusive OR, S- boxes, straight permutation and expansion permutation [5]. Structure of DES algorithm: [6] Source: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Steps involved in DES algorithm are: (i) Inputs of DES are 64-bits plain text and 56-bits key. Output of DES is 64-bits cipher text. In DES,
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 193 block of plain text is converted into block of cipher text. (ii) Processing of block: Transposition is applied to 64- bits plain text. This process is called keyless initial permutation. (iii) Processing of key: 64-bits key provided by the user is reduced to 56-bits by removing the parity bits (8, 16, 24, 32, 40, 48, 56 and 64). Split the key into two halves of 28-bits each. After this, circular left shifts are applied on both halves. Then by applying compression permutation 56-bits key is reduced to 48-bits. This 48-bits key is used for encryption. This component is called key processor sub component. It provides different set of 48-bits for 16 rounds means all the 16 complex round ciphers use a different key derived from the original key. (iv) Split the block produced in step (ii) into two halves of 32-bits each. (v) Expansion permutation is applied to one half to increase its size to 48-bits. (vi) XOR operation is applied to 48-bits of plain text produced in step (v) and 48-bits fetched from key processor sub component in step (iii). (vii) Output of step (vi) is fed into the S-box which reduces the 48-bits block into 32-bits block. (viii) Output of step (vii) is subjected to straight permutation for changing the order of bits. (ix) Again XOR operation is applied to the output of step (viii) and other half of the block produced in step (iv). (x) The two data halves are then swapped and become the input for the next round (xi) Cipher text is obtained after completing 16 rounds and by applying final permutation (reverse of initial permutation) [7]. For decryption, same process is used but in reverse order. DES algorithm is widely used for better security. Security depends heavily on S-boxes. 3. RSA (RIVEST, SHAMIR, ADLEMAN) ALGORITHM: RSA was discovered in 1978. RSA is a Public (asymmetric) key cryptography algorithm; it is named after the initials of its discoveres, Ron Rivest, Adi Shamir and Len Adelman in 1977. It is the most popular asymmetric key cryptographic algorithm which is used to provide both secrecy and digital signature. It uses the prime numbers to generate public and private keys based on mathematical calculations and multiplying large numbers together [8]. Steps involved in RSA algorithm are generation of public and Private keys, Encryption Process, Decryption Process. Generation of Public and Private Keys Following steps are used for generating keys: Choose any two prime numbers say p & q. (p & q cannot be divided by any other number except 1 and itself). Calculate n, n = p x q. Calculate another number Ø also known as Euler’s totient function. Value of Ø = (p-1) x (q-1). Now assume a number e such that d x e = 1 (mod Ø). The value of e should lie between 1 and Ø. Number e should be a prime number. Number e and Ø should be co-prime means e and Ø are not divisible by any other number except 1 or in other words g.c.d. of e and Ø should be 1. Now calculate the value of d by using extended Euclidean algorithm’s table method. After calculating the value of d, public keys (e and n) are announced to the public and private keys (d and Ø) are kept secret. Encryption process: Now anyone can send a message by using public keys (e and n). Plain text (Original message) is converted into Cipher text (scrambled message) by using the following formula: C = Pe (mod n) Decryption process: Cipher text is converted into Plain text by using private key d. Cipher text (scrambled message) is converted into Plain text (original message) by using the following formula: P = Cd (mod n) Modular exponentiation is used for Encryption and Decryption process. RSA algorithm requires complex computation and hence it is very slow. In Public key algorithms, the underlying modular exponentiation and factoring large numbers into prime numbers depend on multiplication and division, which are inherently slower and requires a lot of processing power. 4. COMPARISON OF PRIVATE AND PUBLIC KEY CRYPTOGRAPHIC ALGORITHMS: Conceptual comparison of DES and RSA: Factors DES (Private Key Algorithm) RSA (Public Key Algorithm) Message Length Suitable for long messages Suitable for short messages Data rate Fast Slow Requirement of memory space Less memory space required More memory space required Encryption Process Fast Slow Decryption Process Fast Slow Type of algorithm (or cryptography) Symmetric Asymmetric Speed of computation Fast Slow Complexity O(logN) O(N3) Security Moderate Highest Nature Closed Open
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 194 Vulnerabilities (or weaknesses) Brute Forced, Linear and Differential cryptanalysis attack Brute Forced and Oracle attack Cause of vulnerability Weak key usage Weak Secure services Confidentiality Confidentiality, Integrity, Non- repudiation Job of intruder (or Hacker) Easy Deduction of key is based on guesses and knowledge of language. Key could be derived by Hit and trial or by recognizing patterns or by combination of guesses, strategy and mathematical skill. Difficult Block size 64 bits Minimum 512 bits Power consumption Low High Rounds 16 1 Throughput Very high Low Confidentiality High Low Software Implementation Fast (DES is at least 100 times faster than RSA) Slow Hardware Implementation Fast (DES is between 1,000 and 10,000 times faster (depending on the implementation) than RSA) Slow Encryption and Decryption algorithm Different Same Cryptanalysis method Differential method Product factorization Key-Based comparison of DES and RSA: Factors DES (Private Key Algorithm) RSA (Public Key Algorithm) Relationship between Encryption and Decryption Keys Encryption and Decryption keys are inverse of each other. P = D(K, E(K, P)) Encryption and Decryption keys come in pairs. P = D(KD, E(KE, P)) Derivation of Decryption key from Encryption key Easy Difficult (almost impossible) Key Distribution Problematic (not as popular as RSA) Simple (widely used for key distribution) Type of key Private or Secret Public Key Size 56 bits >1024 bits Key Key transportation Key transportation is transportation (or transmission) is necessary because sender and receiver both use the same key. not necessary (the biggest advantage of public key cryptography is the secure nature of private key, it never needs to be transmitted or revealed). Sharing of key (or key exchange) Difficult (in the world of Internet, the communicating parties may never meet and converse except over the network so how do they share key and communicate). Simple (problem of key sharing can be solved by using RSA because it uses two keys: public and private. Public key is announced by the receiver and is available on the web page of receiver). Ways used for key sharing Telephone lines are used which are prone to eavesdropping. Public key is available on the web page of the receiver. Sender uses this public key to encrypt the message. Key disclosure Key is not disclosed publicly. Key is disclosed on the web. Key management Difficult Easy Key deposit Needed Needed Comparison of DES and RSA on the basis of Encryption and Decryption Time: S. No. Algorithm Packet Size (KB) Encryption Time (Sec) Decryption Time (Sec) 1 DES 153 3.0 1 RSA 7.3 4.9 2 DES 118 3.2 1.2 RSA 10.0 5.0 3 DES 196 2.0 1.4 RSA 8.5 5.9 4 DES 312 3.0 1.6 RSA 7.8 5.1 5 DES 868 4.0 1.8 RSA 8.2 5.1 [9] Source: International Journal of Science and Research (IJSR) From the above table it is clear that RSA takes more time for Encryption and Decryption than DES. Hence, Public key algorithms are slower than Private Key algorithms. 5. CONCLUSIONS Security of any algorithm is highly based on the length of the key being used. Private and public key algorithms have their own advantages and disadvantages. Private key algorithms require less memory than Public key algorithms. Computation speed of Private key algorithms is much faster than Public key algorithms. Because of the amount of
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 195 computations involved, Public key algorithms are very slow and are useful only for specialized tasks. Private key encryption is 10,000 times faster than the Public Key encryption because in Public Key algorithms, the underlying modular exponentiation and factoring large numbers into prime numbers depend on multiplication and division, which are inherently slower and requires a lot of processing power than the bit operations (addition, exclusive OR, substitution and transposition, shifting columns, shifting rows) on which Private key algorithms are based. Therefore, cryptographers use Private key algorithms for frequent tasks where slow operation is a major problem and Public key algorithms are reserved for specialized, infrequent uses, where slow operation is not a problem. Key distribution is simple in public key algorithms whereas it is complex in Private key algorithms. So, for providing better services, combination of Private and Public key algorithms can be used. Hybrid (means combination of Private and Public key algorithms) scheme can be used to provide better security in networks. For an instance, firstly use Public key algorithm for key distribution and then send data securely by using Private key algorithm. Public key algorithms are more often used as a solution to the key-management problem. For short messages, only public key algorithms can be used and for long messages, combination of Private and public key algorithms can be used for sending data securely. This combination of Private and Public key algorithms often capitalizes on the best features of each. REFERENCES [1]. Rosslin John Robles, Chang-hwa Hong, Tai-hoon Kim, “Wireless Network Security: Vulnerabilities, Threats and Countermeasures”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 3, No. 3, July, 2008. [2]. Mrs.V.Umadevi Chezhian, Dr. Ramar, Mr. Zaheer Uddin Khan, “Security Requirements in Mobile Ad Hoc Networks”, International Journal of Advanced Research in Computer and Communication Engineering, ISSN 2278 – 1021, Vol. 1, Issue 2, April 2012. [3]. Gurpreet Singh, Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”, International Journal of Computer Applications (0975 – 8887) Volume 67– No.19, April 2013. [4]. Dr. Prerna Mahajan, Abhishek Sachdeva, “A study of Encryption algorithms AES, DES and RSA for security”, Global Journal of Computer Science and Technology, Volume 13 Issue 15 Version 1.0 Year 2013. [5]. Dr. Sudesh Jakhar, Aman Kumar, Sunil Makkar, “Comparative Analysis between DES and RSA algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, ISSN: 2277 128X, July 2012. [6]. Shaymaa Mohammed Jawad Kadhim Manjusha Joshi, Dr. Shashank Joshi, “Provide the Security to a Web Service by using DES Cryptography Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, October 2013 ISSN: 2277 128X, figure2. [7]. Prashanti.G, Deepthi.S, Sandhya Rani.K, “A Novel Approach for Data Encryption Standard Algorithm”, International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Volume-2, Issue- 5, June 2013. [8]. Mohit Marwaha, Rajeev Bedi, “Comparative analysis of Cryptographic Algorithms”, International Journal of Advanced Engineering Technology, IV/III/July- Sept.,2013/16-18, E-ISSN 0976-3945. [9]. B. Padmavathi, S. Ranjitha Kumari, “A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique”, International Journal of Science and Research (IJSR) India Online ISSN: 2319-7064, Volume 2 Issue 4, April 2013, Table2. BIOGRAPHIE Priti Bali is working as an Assistant Professor in D.A.V. Institute of Management, Faridabad.