Towards Excellence

(ISSN No. 0974-035X)
(An indexed refereed & peer-reviewed journal of higher education)
UGC-MALAVIYA MISSION TEACHER TRAINING CENTRE GUJARAT UNIVERSITY

A SURVEY ON SYMMETRIC-KEY AND ASYMMETRIC- KEY ALGORITHMS BASED CRYPTOGRAPHY

Authors:

Ali Mahmood Khalaf , Kamaljit Lakhtaria

Abstract:

Information security is extremely important in terms of maintaining the security of information (text, image, audio, video) and its confidentiality, and as a result of the massive expansion in the field of technology and communications, and the emergence of the role of the internet, and for rapid communication in the transmission of this information (text, image, audio, video) There was a need to secure this information from penetration and make it incomprehensible to people who are not authorized to access this information (text, image, audio, video). Where many algorithms and techniques have appeared to protect this information, namely: Cryptography algorithms, and Steganography techniques. Cryptography is one of the techniques of information security, which studies the secure communication between the sender and receiver of the message, which is the process of converting plain text into cipher text through the use of mathematical operations. In our research paper, a comparative study and analysis of symmetric key and key asymmetric encryption algorithms in terms of effectiveness, key size, time, complexity, functionality, attacks, and research on the most prominent recent technologies such as AES, BLOWFISH, RC2, RC4, CAST, SERPENT, TEA, E-DES, RSA, DIFFIE HELLMAN, and DSA are the safest. Compared to other technologies, faster encryption time, security, speed, and flexibility according to the results.

Keywords:

Cryptography, information security, symmetric-key of Cryptography algorithms, Asymmetric-key of Cryptography algorithms 

Vol & Issue:

VOL.14, ISSUE No.1, March 2022