Reference Hub1
A Comparative Study on Symmetric and Asymmetric Key Encryption Techniques

A Comparative Study on Symmetric and Asymmetric Key Encryption Techniques

Sneha Padhiar, Kuldip Hiralal Mori
ISBN13: 9781799869887|ISBN10: 1799869881|ISBN13 Softcover: 9781799869894|EISBN13: 9781799869900
DOI: 10.4018/978-1-7998-6988-7.ch008
Cite Chapter Cite Chapter

MLA

Padhiar, Sneha, and Kuldip Hiralal Mori. "A Comparative Study on Symmetric and Asymmetric Key Encryption Techniques." Implementing Data Analytics and Architectures for Next Generation Wireless Communications, edited by Chintan Bhatt, et al., IGI Global, 2022, pp. 132-144. https://doi.org/10.4018/978-1-7998-6988-7.ch008

APA

Padhiar, S. & Mori, K. H. (2022). A Comparative Study on Symmetric and Asymmetric Key Encryption Techniques. In C. Bhatt, N. Kumar, A. Bashir, & M. Alazab (Eds.), Implementing Data Analytics and Architectures for Next Generation Wireless Communications (pp. 132-144). IGI Global. https://doi.org/10.4018/978-1-7998-6988-7.ch008

Chicago

Padhiar, Sneha, and Kuldip Hiralal Mori. "A Comparative Study on Symmetric and Asymmetric Key Encryption Techniques." In Implementing Data Analytics and Architectures for Next Generation Wireless Communications, edited by Chintan Bhatt, et al., 132-144. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-6988-7.ch008

Export Reference

Mendeley
Favorite

Abstract

With the rise in use of internet in various fields like education, military, government sector, banking, the security and privacy of the info has been the foremost concern. As in today's era, most of the handling of data and transactions are done online. When the data is transferred from the one end of sender to the other end of receiver online, it's eavesdropped by an intruder and thus could be a threat to the secrecy or confidentiality of the info. The hottest technique that protects the confidentiality of the data is cryptography which converts the plain text into scrambled form which is unreadable. Then the receiver applies a reverse mechanism to decrypt the unreadable data to readable form. This mechanism is known as encryption-decryption process or cryptography. Cryptography can be both symmetric and asymmetric. Here the authors discuss symmetric and asymmetric algorithms.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.