A Study on Applications of Security Algorithms: Attention to RSA and DH Algorithms
Asymmetric key encryption is using the RSA algorithm. Swapping of data one to another by using the public-private key pair. Whereas Diffie-Hellman algorithm is used for key exchange using the perception of primitive root. Symmetric key encryption is used to equally both the users and common key for consequent data-exchange. Cybercrime is used to protected our messages and data are connected with network security. In order to converse over a computer network, the cryptography system is intended. The sender sending an encrypted message to the beneficiary.
"Cryptography Benefits & Drawbacks," [Online]. Available: https://www.tutorialspoint.com/cryptography/benefits_and _drawbacks.htm. [Accessed 23 03 2017].
"Description of Symmetric and Asymmetric Encryption," 2007. [Online]. Available: https://support.microsoft.com/enus/help/246071/description-of-symmetric-andasymmetric-encryption. [Accessed 23 03 2017].
"Symmetric vs. Asymmetric Encryption – What are differences?," [Online]. Available: https://www.ssl2buy.com/wiki/symmetric-vs-asymmetricencryption-what-are-differences. [Accessed 23 03 2017].
Boneh, Dan, et al. "Circular-secure encryption from decision diffie-hellman." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 2008.
D. Chauhan, "RSA and Diffie-Hellman Algorithm," 2016. [Online]. Available: https://www.slideshare.net/daxeshchauhan/rsa-and-diffiehellman-algorithms-64170629. [Accessed 24 03 2017].
E. E. Classes, "Diffie Hellman Key Exchange in Hindi for Symmetric Key Encryption System – With Example," 2016. [Online]. Available: https://www.youtube.com/watch?v=_M2Ea_3DRGA. [Accessed 24 03 2017].
F. H. a. F. R. Michael Cobb, "RSA algorithm (RivestShamir-Adleman)," 2014. [Online]. Available: http://searchsecurity.techtarget.com/definition/RSA. [Accessed 24 03 2017].
H. M. J. Ali Makhmali, "Comparative Study on Encryption Algorithms," International Journal of Scientific & Technology Research, vol. 2, no. 6, p. 44, 2013.
K. H. Rosen, Cryptography Theory and Practice, 3rd ed., University of Waterloo.
K.Suganya, "Performance study on Diffie Hellman," International Journal for Research In Applied Science, vol. 2, no. 3, pp. 68-75, 2014.
R. G. Anjali Patil, "A Comparative Survey of Symmetric Encryption," International Journal of Scientific & Technology Research, vol. 2, no. 8, p. 62, 2013.
S. Blanda, "RSA Encryption – Keeping the Internet Secure," 2014. [Online]. Available: http://blogs.ams.org/mathgradblog/2014/03/30/rsa/. [Accessed 24 03 2017].
Singh, Gurpreet. "A study of encryption algorithms (RSA, DES, 3DES and AES) for information security." International Journal of Computer Applications 67.19 (2013).
Thambiraja, E., G. Ramesh, and Dr R. Umarani. "A survey on various most common encryption techniques." International journal of advanced research in computer science and software engineering 2.7 (2012).
W. Stallings, Network Security Essentials, 4th ed., New York: Pearson Education, Inc, 2011.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.