Open Access
Subscription Access
Distinction between Secret Key and Public Key Cryptography with Existing Glitches
Internet use and network size is growing very fast day-by-day. So there is more need to secure the data transmitted through different services. To provide the security to the network and data, different encryption methods are used. Encryption is the process of translating, plain text" unhidden" to a cipher text "hidden" to provide the security again different attacks. So as to provide the security, two wide secret and public key cryptography algorithms are used. Secret key cryptography and public key cryptography is also known as symmetrical and asymmetrical key cryptography. In this paper, we will comprises the brief description of Secret key cryptography and Public key cryptography algorithms Implement the Public Key Cryptography with RSA algorithm.
Keywords
Encryption, Decryption, Plaintext, Cipher Text
User
Information
- Atul Kahte (2008) Cryptography and Network Security, 2nd Ed.
- Dan Boneh and Glenn Durfee (1999) Cryptanalysis of low exponent RSA
- Diffie W, Hellman ME (1976) New Directions in cryptography.
- Eli Biham & Adli Shamir (1990) Differential Cryptanalysis of full DES.
- Ferguson N, Schnier B & Konho T (2010) Cryptography Engineering: Design principles and Practical applications, 1st Ed.
- Himani Agarwal & Manish Sharma (2010) Implementation and analysis of various symmetric cryptosystems, Indian Journal of Science and Technology, 3(11) Dec-2010.
- Piper F (1997) Encryption. Security and Detection, Ecos. European Conference.
- Schweighofer E (1997) Downloading information Information & Communication technology.
- Yogesh Kumar, Rajiv Munjal (2011) Comparision of symmetric and asymmetric cryptography with existing Vulnerabilities IJCMS.
Abstract Views: 373
PDF Views: 0