Academic Journals Database
Disseminating quality controlled scientific knowledge

Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures

ADD TO MY LIST
 
Author(s): Yogesh Kumar | Harsh Sharma

Journal: International Journal of Computer Science and Management Studies
ISSN 2231-5268

Volume: 11;
Issue: 03;
Start page: 60;
Date: 2011;

ABSTRACT
Internet and networks application are growing very fast, sothe need to protect such application are increased by usingcryptographic methods. The two widely accepted and usedcryptographic methods are symmetric and asymmetric. TheDES ideally belongs to the category of symmetric key cryptography and RSA belongs to the category of asymmetric key cryptography. This paper comprises of brief description of RSA and DES cryptography algorithms and their existing vulnerabilities along with theircountermeasures. Besides this, there is a theoretical performance analysis and comparisons of symmetric and asymmetric cryptography.

Tango Rapperswil
Tango Rapperswil

     Save time & money - Smart Internet Solutions