Open Access Open Access  Restricted Access Subscription Access

Distinction between Secret Key and Public Key Cryptography with Existing Glitches


Affiliations
1 BRCM Bahal Bhiwani, India
2 Associate Professor, Department of Information technology, BRCM Bahal (Bhiwani), India
3 Assistant Professor, Department of Information technology, BRCM Bahal (Bhiwani), India
 

Internet use and network size is growing very fast day-by-day. So there is more need to secure the data transmitted through different services. To provide the security to the network and data, different encryption methods are used. Encryption is the process of translating, plain text" unhidden" to a cipher text "hidden" to provide the security again different attacks. So as to provide the security, two wide secret and public key cryptography algorithms are used. Secret key cryptography and public key cryptography is also known as symmetrical and asymmetrical key cryptography. In this paper, we will comprises the brief description of Secret key cryptography and Public key cryptography algorithms Implement the Public Key Cryptography with RSA algorithm.

Keywords

Encryption, Decryption, Plaintext, Cipher Text
User
Notifications

  • Atul Kahte (2008) Cryptography and Network Security, 2nd Ed.
  • Dan Boneh and Glenn Durfee (1999) Cryptanalysis of low exponent RSA
  • Diffie W, Hellman ME (1976) New Directions in cryptography.
  • Eli Biham & Adli Shamir (1990) Differential Cryptanalysis of full DES.
  • Ferguson N, Schnier B & Konho T (2010) Cryptography Engineering: Design principles and Practical applications, 1st Ed.
  • Himani Agarwal & Manish Sharma (2010) Implementation and analysis of various symmetric cryptosystems, Indian Journal of Science and Technology, 3(11) Dec-2010.
  • Piper F (1997) Encryption. Security and Detection, Ecos. European Conference.
  • Schweighofer E (1997) Downloading information Information & Communication technology.
  • Yogesh Kumar, Rajiv Munjal (2011) Comparision of symmetric and asymmetric cryptography with existing Vulnerabilities IJCMS.

Abstract Views: 301

PDF Views: 0




  • Distinction between Secret Key and Public Key Cryptography with Existing Glitches

Abstract Views: 301  |  PDF Views: 0

Authors

Aman Kumar
BRCM Bahal Bhiwani, India
Sudesh Jakhar
Associate Professor, Department of Information technology, BRCM Bahal (Bhiwani), India
Sunil Makkar
Assistant Professor, Department of Information technology, BRCM Bahal (Bhiwani), India

Abstract


Internet use and network size is growing very fast day-by-day. So there is more need to secure the data transmitted through different services. To provide the security to the network and data, different encryption methods are used. Encryption is the process of translating, plain text" unhidden" to a cipher text "hidden" to provide the security again different attacks. So as to provide the security, two wide secret and public key cryptography algorithms are used. Secret key cryptography and public key cryptography is also known as symmetrical and asymmetrical key cryptography. In this paper, we will comprises the brief description of Secret key cryptography and Public key cryptography algorithms Implement the Public Key Cryptography with RSA algorithm.

Keywords


Encryption, Decryption, Plaintext, Cipher Text

References