A Comparative Study on Symmetric and Asymmetric Key Encryption Techniques

A Comparative Study on Symmetric and Asymmetric Key Encryption Techniques

Sneha Padhiar, Kuldip Hiralal Mori
DOI: 10.4018/978-1-7998-6988-7.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With the rise in use of internet in various fields like education, military, government sector, banking, the security and privacy of the info has been the foremost concern. As in today's era, most of the handling of data and transactions are done online. When the data is transferred from the one end of sender to the other end of receiver online, it's eavesdropped by an intruder and thus could be a threat to the secrecy or confidentiality of the info. The hottest technique that protects the confidentiality of the data is cryptography which converts the plain text into scrambled form which is unreadable. Then the receiver applies a reverse mechanism to decrypt the unreadable data to readable form. This mechanism is known as encryption-decryption process or cryptography. Cryptography can be both symmetric and asymmetric. Here the authors discuss symmetric and asymmetric algorithms.
Chapter Preview
Top

1. Introduction

Everyday an outsized amount of Security related Data/Information is transferred and accessed across the online (over the internet) in world application. In today’s corporate world where access to Information in lesser time is required. With the goal of running the enterprise smoothly and efficiently it is vital to supply right information to right people at right time. There might be a scenario where one that's sending an important file to the other person, who is sitting at another site office then the message crosses through an insecure channel and will be possible that somebody within the center can retrieve the message and modify it then passes it to destination. which may cause many undesirable side effects to the corporate and thus the company may suffer a huge loss in economic terms. So, to make data of company in secure manner we required some desired techniques to protect data. Cryptography plays a very big role keep the message safe because the info is transit. It ensures that the message being sent at one end remains confidential and can be received only by the intended receiver at the other end. Cryptography converts the primary message in to non-readable format and sends the message over an insecure channel. Cryptography are often stated because the art of writing which involves the transition of message to a concealed form or unintelligible data. the data in unintelligible within the sense that understanding of the data is difficult or impossible. The terms encryption and decryption are mainly used with the cryptographic process. Encryption is that the method of converting an original message to a random /non-readable message which is known as cipher text. Encryption has its reverse process mentioned as decryption. Where cipher text is converted back to the form of original message. Plain text Cipher Text Plain Text Encryption Decryption.

Figure 1.

Encryption decryption process

978-1-7998-6988-7.ch008.f01

in fig 1. the primary message, plaintext is converts into the cipher text by applying the encryption procedure and cipher text is converted back to plain text through the decryption process. The cryptographic process makes use of an algorithm and a secret(key). The key's often same for encryption decryption process or are often a special one relying on the type of encryption algorithm used. Depending upon the type of key used, cryptography techniques are often divided into two different categories.

  • Symmetric Key encryption

  • Asymmetric Key encryption

Symmetric key encryption is that the type of encryption method where the sender and receiver make use of the same secret key for encryption also as decryption process. Because one keys used for both functions, secret key cryptography is additionally called symmetric key encryption. Samples of symmetric key encryption-algorithms.

Figure 2.

Classification of encryption methods

978-1-7998-6988-7.ch008.f02

There are two main applications of asymmetric cryptography: authentication and secrecy. Messages can be signed with a private key using asymmetric cryptography, and then someone with the public key can verify that someone who has the corresponding private key has generated the message. This can be combined with an identity proof scheme in order to understand what individual (person or group) actually owns.

Top

2. Literature Review

Seth, S. M., & Mishra, R. (2011) has shown many cryptography algorithms that can used to secure information, such as DES, 3DES, Blowfish, AES, RSA, ElGamal and Paillier. All of these algorithms are compared by Seth, S. M., & Mishra, R. (2011) unique on their way. However, the problem is that how to find the best security algorithm which provides the high security and also take less time for a key generation, encryption, and decryption of information. Security algorithms will depend on pros and cons of each algorithm, requirement and suitable for different application.

Complete Chapter List

Search this Book:
Reset