Professional Documents
Culture Documents
A Comparative Survey of Symmetric and Asymmetric Key Cryptography
A Comparative Survey of Symmetric and Asymmetric Key Cryptography
net/publication/266971408
CITATIONS READS
31 3,392
4 authors, including:
Sk Safikul Alam
Jubilant Life Sciences
37 PUBLICATIONS 131 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
[Elsevier] Intelligent Environmental Data Analysis and Pollution Management View project
All content following this page was uploaded by Smita Paira on 13 May 2015.
Abstract- Network security is an important aspect of and cipher text. The original message is called the
information sharing. Attempts have been made to plain text and the encrypted version of the message
remove various insecurities over internet. For this, is called the cipher text. The cipher is finally
many technological implementations and security decrypted to get the original message.
policies have been developed. The amount of data,
Cryptography is broadly classified into two main
transferred, is not a factor. The basic factor is, how
much security, the channel provides while types. These are symmetric key encryption
transmitting data. Cryptography is one such technique and asymmetric key encryption
technique, which allows secure data transmission technique.
without losing its confidentiality and integrity. Based
on the key distribution, cryptography is further A. Symmetric Key Cryptography
classified into two major types-Symmetric Key
Cryptography and Asymmetric Key Cryptography. Symmetric key cryptography is also called
In this paper, we have surveyed the traditional secret-key or shared key cryptography. In this type
algorithms, along with the proposed algorithms based
of mechanism, the sender and receiver shares a
on their pros and cons, related to Symmetric and
Asymmetric Key Cryptography. We have also common key for both encryption and decryption
compared the importance of both these cryptographic [42]. The method follows self-certification method
techniques. The proposed algorithms proved to be i.e. the key is self-certified. The key needs to be
highly efficient in their respective grounds but there shared through secret communication. If it is
are certain areas that remained open, related to these compromised then the encrypted message can be
algorithms, and have not yet been thoroughly easily decrypted by the attacker. This type of
discussed. This paper also presents an appropriate cryptographic technique is required because it
future scope related to these open fields. provides faster service without using many
resources [43]. Various algorithms have been
Keywords- Cryptography, Symmetric Key
developed so far to describe symmetric key
Cryptography, Asymmetric Key Cryptography,
Public Key, Private Key, encryption, decryption, cryptography. These are AES, DES, 3DES,
DPA,CPA, FPGA. Blowfish.
I. INTRODUCTION
Both Symmetric and Asymmetric Key [8] Min-Ho Park, Young-Hoon Park, Han-You
algorithms are highly efficient in securing the Jeong, and Seung-Woo Seo, “Key Management for
transferred data over any communication medium. Multiple Multicast Groups in Wireless Networks”,
In this paper, we have highlighted the basic as well IEEE Transactions on Mobile Computing, vol. 12,
as proposed algorithms related to these no. 9, pp. 1712-1723, Sept. 2013, IEEE
cryptographic techniques. In Symmetric Key
Cryptography, a single key is for both encryption [9] Aggelos Kiayias and Moti Yung, “Breaking and
and decryption purposes. The sharing of this key Repairing Asymmetric Public-Key Traitor
becomes sometimes insecure. On the other hand, Tracing”, pp.1-16, IEEE
Asymmetric Key Cryptography uses two separate
keys to prevent any unethical access to the data. [10] Robert M. Bevensee, “Feigenbaum encryption
The public key remains public and the private key of messages”, IEEE Potentials, pp. 39-41, Feb.
is not shared. This technique ensures better security
/Mar. 2001, IEEE
than the former. Moreover, the use of Digital
Signatures in case of Asymmetric Key
[11] Radu Terec, Mircea-Florin Vaida, Lenuta
Cryptography provides high data confidentiality
and non-repudiation. Yet, Symmetric Key Alboaie, and Ligia Chiorean, “DNA Security using
Cryptography has many well known applications Symmetric and Asymmetric Cryptography”, The
because of its simplicity. Society of Digital Information and Wireless
Communications, vol-1, no-1, pp. 34-51, 2011,
REFERENCES IEEE
[12] Massimo Alioto, Massimo Poli, and Santina Chaotic System”, IEEE Transactions on Circuits
Rocchi, “Differential Power Analysis Attacks to and Systems—I: Regular Papers, vol. 53, no. 4, pp.
Precharged Buses: A General Analysis for 848-857, April 2006, IEEE
Symmetric-Key Cryptographic Algorithms”, IEEE
Transactions on Dependable and Secure [22] Luca Breveglieri, Israel Koren, and Paolo
Computing, vol. 7, no. 3, pp. 226-239, July-Sept. Maistri, “An Operation-Centered Approach to Fault
2010, IEEE Detection in Symmetric Cryptography Ciphers”,
IEEE Transactions on Computers, vol. 56, no. 5,
[13] Massimo Alioto, Massimo Poli, and Santina pp. 635-649, May 2007, IEEE
Rocchi, “A General Power Model of Differential
Power Analysis Attacks to Static Logic Circuits”, [23] Elisa Bertino, Ning Shang, and Samuel S.
IEEE Transactions on Very Large Scale Wagstaff Jr., “An Efficient Time-Bound
Integration (VLSI) Systems, vol. 18, no. 5, pp. 711- Hierarchical Key Management Scheme for Secure
724, May 2010 , IEEE Broadcasting”, IEEE Transactions on Dependable
and Secure Computing, vol. 5, no. 2, pp. 65-70,
[14] Sean O’Melia and Adam J. Elbirt, “Enhancing April-June 2008, IEEE
the Performance of Symmetric-Key Cryptography
via Instruction Set Extensions”, IEEE Transactions [24] Chung-Ming Ou,” Design of Block Ciphers by
on Very Large Scale Integration (VLSI) Systems, Simple Chaotic Functions”, IEEE Computational
vol. 18, no. 11, pp. 1505-1518, Nov. 2010, IEEE Intelligence Magazine, pp.54-59, May 2008, IEEE
[15] Mehran Mozaffari-Kermani and Arash [25] Hsiao-Kuang Wu, Shu-ching Yang, and Yung-
Reyhani-Masoleh, “Efficient and High- Tai Lin, “The Sharing Session Key Component
Performance Parallel Hardware Architectures for (SSKC) Algorithm for End-to-End Secure Wireless
the AES-GCM”, IEEE Transactions on Computers, Communication”, pp. 242-250, IEEE
vol. 61, no. 8, pp. 1165-1178, Aug. 2012, IEEE
[26] Mohammad Jabed Morshed Chowdhury and
[16] Miodrag J. Mihaljevic´, Ryuji Kohno, Tapas Pal, “A New Symmetric Key Encryption
“Cryptanalysis of Fast Encryption Algorithm for Algorithm based on 2-d Geometry”, 2009
Multimedia FEA-M”, IEEE Communications International Conference on Electronic Computer
Letters, vol. 6, no. 9, pp. 382-384, Sept. 2002, Technology, pp. 541-544, IEEE
IEEE
[27] Wu Suyan, Li Wenbo, and Hu Xiangyi,
[17] Ahmet M. Eskicioglu and Edward J. Delp, “A “Study of Digital Signature with Encryption Based
KEY TRANSPORT PROTOCOL BASED ON on Combined Symmetric Key”, IEEE
SECRET SHARING APPLICATIONS TO
INFORMATION SECURITY”, IEEE Transactions [28] Bibhudendra Acharya, Sambit Kumar Shukla,
on Consumer Electronics, vol. 48, no. 4, pp. 816- Saroj Kumar Panigrahy,Sarat Kumar Patra, and
824, Nov. 2002, IEEE Ganapati Panda, “H-S-X Cryptosystem and Its
Application to Image Encryption”, 2009
[18] Miodrag J. Mihaljevic, “On Vulnerabilities International Conference on Advances in
and Improvements of Fast Encryption Algorithm Computing, Control, and Telecommunication
for Multimedia FEA-M”, IEEE Transactions on Technologies, pp.720-724, IEEE
Consumer Electronics, vol. 49, no. 4, pp. 1199-
1207, Nov. 2003, IEEE [29] Dripto Chatterjee, Joyshree Nath, Suvadeep
Dasgupta, and Asoke Nath, “A new Symmetric key
[19] Markus Volkmer and Sebastian Wallner, Cryptography Algorithm using extended MSA
“Tree Parity Machine Rekeying Architectures”, method: DJSA symmetric key algorithm”, 2011
IEEE Transactions on Computers, vol. 54, no. 4, International Conference on Communication
pp.421-427, April 2005, IEEE Systems and Network Technologies, pp. 89-94,
IEEE
[20] Adam J. Elbirt and Christof Paar, “An
Instruction-Level Distributed Processor for [30] A.Nath, S.Ghosh, and M.A.Mallik,
Symmetric-Key Cryptography”, IEEE Transactions “Symmetric key cryptography using random key
on Parallel and Distributed Systems, vol. 16, no. 5, generator”, Proceedings of International
pp. 468-480, May 2005, IEEE conference on SAM-2010 held at Las Vegas(USA)
12-15 July,2010, vol-2,pp. 239- 244
[21] Ranjan Bose and Saumitr Pathak, “A Novel
Compression and Encryption Scheme Using [31] Neeraj Khanna, Joyshree Nath, Joel James,
Variable Model Arithmetic Coding and Coupled Amlan Chakrabarti, Sayantan Chakraborty, and
Asoke Nath, “New Symmetric key Cryptographic Conference on Communication Systems and
algorithm using combined bit manipulation and Network Technologies, pp.776-781, IEEE
MSA encryption algorithm: NJJSAA symmetric
key algorithm”, 2011 International Conference on [40] Ravi Kishore Kodali, “ECC with Hidden
Communication Systems and Network Generator Point in WSNs”, 2014 IEEE Region 10
Technologies, pp. 125-130, IEEE Symposium, pp. 131-136, IEEE
[32] Debanjan Das, Megholova Mukherjee, Neha [41] Andrea Höller, Norbert Druml, Christian
Choudhary, Asoke Nath, and Joyshree Nath, “An Kreiner, Christian Steger, and Tomaz Felicijan,
Integrated Symmetric key Cryptography Algorithm “Hardware/Software Co-Design of Elliptic-Curve
using Generalised modified Vernam Cipher method Cryptography for Resource-Constrained
and DJSA method: DJMNA symmetric key Applications”, DAC ’14 June 01 - 05 2014, IEEE
algorithm”, 2011 World Congress on Information
and Communication Technologies, pp. 1199-1204, [42]www.webopedia.com/TERM/S/symmetric_key
IEEE _cryptography.html