Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Makkar, Sunil
- Distinction between Secret Key and Public Key Cryptography with Existing Glitches
Abstract Views :300 |
PDF Views:0
Authors
Affiliations
1 BRCM Bahal Bhiwani, IN
2 Associate Professor, Department of Information technology, BRCM Bahal (Bhiwani), IN
3 Assistant Professor, Department of Information technology, BRCM Bahal (Bhiwani), IN
1 BRCM Bahal Bhiwani, IN
2 Associate Professor, Department of Information technology, BRCM Bahal (Bhiwani), IN
3 Assistant Professor, Department of Information technology, BRCM Bahal (Bhiwani), IN
Source
Indian Journal of Education and Information Management, Vol 1, No 9 (2012), Pagination: 392-395Abstract
Internet use and network size is growing very fast day-by-day. So there is more need to secure the data transmitted through different services. To provide the security to the network and data, different encryption methods are used. Encryption is the process of translating, plain text" unhidden" to a cipher text "hidden" to provide the security again different attacks. So as to provide the security, two wide secret and public key cryptography algorithms are used. Secret key cryptography and public key cryptography is also known as symmetrical and asymmetrical key cryptography. In this paper, we will comprises the brief description of Secret key cryptography and Public key cryptography algorithms Implement the Public Key Cryptography with RSA algorithm.Keywords
Encryption, Decryption, Plaintext, Cipher TextReferences
- Atul Kahte (2008) Cryptography and Network Security, 2nd Ed.
- Dan Boneh and Glenn Durfee (1999) Cryptanalysis of low exponent RSA
- Diffie W, Hellman ME (1976) New Directions in cryptography.
- Eli Biham & Adli Shamir (1990) Differential Cryptanalysis of full DES.
- Ferguson N, Schnier B & Konho T (2010) Cryptography Engineering: Design principles and Practical applications, 1st Ed.
- Himani Agarwal & Manish Sharma (2010) Implementation and analysis of various symmetric cryptosystems, Indian Journal of Science and Technology, 3(11) Dec-2010.
- Piper F (1997) Encryption. Security and Detection, Ecos. European Conference.
- Schweighofer E (1997) Downloading information Information & Communication technology.
- Yogesh Kumar, Rajiv Munjal (2011) Comparision of symmetric and asymmetric cryptography with existing Vulnerabilities IJCMS.