Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/266971408

A comparative survey of Symmetric and Asymmetric Key Cryptography

Conference Paper · November 2014


DOI: 10.1109/ICECCE.2014.7086640

CITATIONS READS

31 3,392

4 authors, including:

Sourabh Chandra Smita Paira


Calcutta Institute of Technology, Kolkata Indian Institute of Engineering Science and Technology, Shibpur
40 PUBLICATIONS   131 CITATIONS    24 PUBLICATIONS   88 CITATIONS   

SEE PROFILE SEE PROFILE

Sk Safikul Alam
Jubilant Life Sciences
37 PUBLICATIONS   131 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

On Mobile Computing View project

[Elsevier] Intelligent Environmental Data Analysis and Pollution Management View project

All content following this page was uploaded by Smita Paira on 13 May 2015.

The user has requested enhancement of the downloaded file.


2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)

A comparative survey of symmetric and asymmetric key


cryptography

Sourabh Chandra Smita Paira


Assistant Professor B.Tech Student
Department of Computer Science Department of Computer Science
& Engineering, & Engineering,
Calcutta Institute of Technology Calcutta Institute of Technology
Kolkata, India Kolkata, India
sourabh.chandra@gmail.com smtpaira@gmail.com

Sk Safikul Alam Dr.(Prof.) Goutam Sanyal


Assistant Professor Professor
Department of Computer Science Department of Computer Science
& Engineering, & Engineering,
Calcutta Institute of Technology National Institute of Technology
Kolkata, India Durgapur, India
mail2safikul@gmail.com nitgsanyal@gmail.com

Abstract- Network security is an important aspect of and cipher text. The original message is called the
information sharing. Attempts have been made to plain text and the encrypted version of the message
remove various insecurities over internet. For this, is called the cipher text. The cipher is finally
many technological implementations and security decrypted to get the original message.
policies have been developed. The amount of data,
Cryptography is broadly classified into two main
transferred, is not a factor. The basic factor is, how
much security, the channel provides while types. These are symmetric key encryption
transmitting data. Cryptography is one such technique and asymmetric key encryption
technique, which allows secure data transmission technique.
without losing its confidentiality and integrity. Based
on the key distribution, cryptography is further A. Symmetric Key Cryptography
classified into two major types-Symmetric Key
Cryptography and Asymmetric Key Cryptography. Symmetric key cryptography is also called
In this paper, we have surveyed the traditional secret-key or shared key cryptography. In this type
algorithms, along with the proposed algorithms based
of mechanism, the sender and receiver shares a
on their pros and cons, related to Symmetric and
Asymmetric Key Cryptography. We have also common key for both encryption and decryption
compared the importance of both these cryptographic [42]. The method follows self-certification method
techniques. The proposed algorithms proved to be i.e. the key is self-certified. The key needs to be
highly efficient in their respective grounds but there shared through secret communication. If it is
are certain areas that remained open, related to these compromised then the encrypted message can be
algorithms, and have not yet been thoroughly easily decrypted by the attacker. This type of
discussed. This paper also presents an appropriate cryptographic technique is required because it
future scope related to these open fields. provides faster service without using many
resources [43]. Various algorithms have been
Keywords- Cryptography, Symmetric Key
developed so far to describe symmetric key
Cryptography, Asymmetric Key Cryptography,
Public Key, Private Key, encryption, decryption, cryptography. These are AES, DES, 3DES,
DPA,CPA, FPGA. Blowfish.

I. INTRODUCTION

Cryptography is the technique of writing


secrets. This secures data and information from any
internal or external attacks. Thus, it provides
integrity, confidentiality, non-repudiation and
authenticity to the secret data. The concept of
cryptography is based on two main terms-plain text

978-1-4799-5748-4/14/$31.00 © 2014 IEEE 83


2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)

Fig.1. Symmetric Key Cryptography


Fig.3. Classification of Symmetric Key Algorithms
B. Asymmetric Key Cryptography
TABLE 1. COMPARISON TABLE FOR DIFFERENT
The asymmetric key cryptography is known as SYMMETRIC KEY ALGORITHMS
public key cryptography. In this technique, the
Method DES 3DES AES Blowfish
sender uses a public key of the receiver for
encryption and the receiver uses his private key to Develop IBM IBM in National Bruce
decrypt the message. The concept of self- ed By and 1978 Institute of Schneier
certification is absent here instead digital signatures US Standards in 1993
are used to certify the keys. This method is more gover and
convenient and provides better authentication as the nmen Technolog
privacy remains intact [43]. There are various t in y (NIST)
algorithms to implement this encryption 1974
mechanism. These are RSA, Diffie-Hellman, ECC Structure Fieste Fiestel Substitutio Fiestel
and Digital Signature Algorithm. of l Networ n and Network
algorith Netw k Permutatio
m ork n Network

Key 56 Three 128-bit, Variable


Length bits 64-bit 192-bit, key
keys, 256-bit length
with with
overall maximu
key m key
length length of
of 192 448 bits
bits
[47]
Block 64 64 128 64
size
No. Of 16 48 9 16
rounds
Vulnera brute Some Side Not
bilities force theoreti channel prone to
attack cal attacks attacks.
Fig.2. Asymmetric Key Cryptography , man attacks
in the
II. COMPARISON STUDY ON GENERAL middl
SYMMETRIC KEY ALGORITHMS e
attack
The different algorithms for symmetric key
cryptography are classified below. Efficienc Slow Relativ Efficient in Highly
y ely both efficient
slow in Software in
softwar and Software
e [44] Hardware

978-1-4799-5748-4/14/$31.00 © 2014 IEEE 84


2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)

Security Frequent key changing is essential.


Solutions Development of Station-to-Station
III. COMPARISON STUDY ON GENERAL protocol defeats Man in the Middle
ASYMMETRIC KEY ALGORITHMS attacks. The development of digital
signature is also a solution to the
The different algorithms for asymmetric key attacks.
cryptography are classified below.
Method Elliptical Curve Cryptography
(ECC)
Features It computes the keys through
elliptic curve equations [51].
Advantages It can yield security using a 164 bit
key and is more advantageous than
RSA and Diffie Hellman algorithms
[51]. It consumes less power and
provides better utilities to batteries.
Downsides It increases the size of encrypted
message and is more complex and
difficult to implement, compared to
RSA [52].
Security Introduction of Elliptic Curve
Solutions Digital Signature Algorithm
Fig.4. Classification of Asymmetric Key Algorithms (ECDSA) [53].The Authenticated
key agreement protocol, ECMQV
TABLE 2. COMPARISON TABLE FOR DIFFERENT protects against Man-in-the-Middle
ASYMMETRIC KEY ALGORITHMS attacks.
Method Digital Signature Algorithm (DSA)
Method Rivest-Shamir-Adleman (RSA) Features It consists of a pair of large
Features General form is (d, e) where d numbers, computed based on some
represents the private key and e algorithms to authenticate data [54].
represents the public key. Both The signatures are generated
encryption and decryption uses the through private keys and are
same function [44]. verified using public keys.
Advantages It is difficult to produce the private Advantages It is very fast and provides non-
key from the public key and repudiation and authenticity [55]. It
modulus, thus it is highly secure. secures the data against various
Computing the reverse of e is very attacks like Man-in-the-Middle
difficult for the attackers [45]. attacks and is more advantageous
Downsides Complexity of generating the key than other asymmetric key
[46]. The process is quite slow. It algorithms.
has not been proved that it is Downsides Digital signatures have short life
equivalent to the factorization span. They are not compatible with
method and factorising a large each other and thus complicate
number is very difficult. sharing [55].
Security Key length should be larger than Security Verification software is necessary.
Solutions 1024 bits [45]. Solutions Digital certificates should be bought
from trusted authorities.
Method Diffie-Hellman
Features It is based on sharing the secret IV. COMPARISON STUDY OF NEWLY
cryptographic key. This key is used PROPOSED SYMMETRIC KEY ALGORITHMS
for both encryption and decryption
purposes. It relies on hardness of TABLE 3. COMPARISON TABLE FOR THE NEWLY
the discrete logarithms [53]. PROPOSED SYMMETRIC KEY ALGORITHMS
Advantages As the symmetric key is of very
short length (256 bits), the Method Algorithm against DPA
algorithm is quite fast [48]. attacks for both chips and
Downsides The longer the symmetric key is Logic Circuits [12][13]
used the more attacks it will face Characteristics The model equations are first
[50]. More vulnerable to Man in the compared to that of CPA and
Middle attacks [49]. then applied to AES and DES

978-1-4799-5748-4/14/$31.00 © 2014 IEEE 85


2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)

algorithms. the algebraic structures used.


Advantages It increases the robustness Implementations Has various multimedia
against the DPA attacks. applications
Pitfalls Increasing the bus width will
increase the number of keys. Method Key transfer protocol for
Hence, detection of correct secret sharing applications
key becomes difficult. [17]
Implementations Crypto chips and static logic Characteristics It uses various threshold and
circuits. secret sharing schemes for key
exchange. It highlights both
Method Instruction Set Extensions for message authentication and
Symmetric Key algorithms conditional access.
[14] Advantages It allows the generation of
Characteristics It includes the codesign of different keys for the different
hardware and software set of receivers. It employs
paradigms to achieve physical minimum computational
security, flexibility, portability requirements and does not
and better performance with depend on any mathematical
hardware implementations. assumptions.
Advantages It reduces execution time, Pitfalls The process consumes much
program code size and time.
increases the throughput. Implementations Satellite, internet, cable
Pitfalls Embedded systems without networks, etc.
any modified processor Method Rekeying architecture based
increases overhead, data on Tree Parity Machine [19]
transfer latency and other Characteristics It uses TDMA with a single
complexities. TPM unit. It implements both
Implementations Medical databases, e-mails, e- FPGA and ASIC realization
commerce, e-banking, etc. using VHDL.
Advantages It is cost effective, consumes
Method Parallel hardware architecture less time with a limited
for AES-GCM algorithm[15] bandwidth and overhead.
Characteristics It optimizes a number of logic Pitfalls Key lifetime is short. It
gates and then compares the reduces the storage area by
performance of S-Boxes with increasing the cycles for
ASIC 65 nm CMOS generating the output bit.
technology. Implementations Embedded system
Advantages It provides both authenticity environments.
and confidentiality
simultaneously for sensitive Method Instruction Level distributed
data. Processor (COBRA) [20]
Pitfalls If the area effort increases, the Characteristics It provides flexibility through
overhead delay increases. If reconfiguration. It maps and
the critical path delay implements the algorithms
increases, the sub pipelining of using COBRA assembly
the system cannot increase its language. Data is gathered
frequency. using cycle counts.
Implementations Various hardware and Advantages It provides both high speed
software processing and security. It
provides an efficient
Method Fast encryption algorithm for implementation of a variety of
multimedia (FEA-M) [16][18] block ciphers and can achieve
Characteristics It uses resynchronization a through of 622 Mbps.
process for chosen and known Pitfalls The block ciphers to be tested
plain text attacks. should be of varying
Advantages It provides an efficient efficiency and performance.
alternative against breakability Implementations Various network encryption
of FEA-M to various attacks. implementations like ATM.
Pitfalls The process has weakness in

978-1-4799-5748-4/14/$31.00 © 2014 IEEE 86


2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)

Method Compression and Encryption confidentiality with less


scheme based on arithmetic computational complexity.
coding and coupled chaotic Advantages In every steps of encryption, it
systems [21][24] produces fixed size messages.
Characteristics It depends on zero-order Pitfalls Floating point operations limit
arithmetic coding using bit the size of block to encode.
streams generated by CCS Hardware implementation is
PRBG. Algorithms are tested tricky.
using text files. Implementations E-commerce, banking, stock
Advantages It is highly secure and is not trading, etc.
vulnerable to attacks against
arithmetic coding and plain Method Method of Digital Signature
texts. based on combined symmetric
Pitfalls The zeroth order suffers about key algorithm [27]
6% over other techniques. Characteristics It depends on both symmetric
Implementations Various ad hoc networks. and hardware technology. It
uses timestamps as a factor of
Method Operation Centred approach of such symmetric key
fault detection [22] algorithms.
Characteristics It enumerates the arithmetic Advantages The key is time variant and
and logical operations and maintenance free. It deciphers
then analyses the efficiency faster and has a simple key
and hardware complexity management compared to
using 11 symmetric ciphers. asymmetric digital signature
Advantages It can perform the analysis algorithms.
even if the error propagation is Pitfalls The process is slight lengthy.
non-linear. Detection coverage Implementations Various transactions like e-
is 100% commerce, etc
Pitfalls Analysis of multiple bit error
is complicated. Method Hill-Shift-XOR encryption
Implementations Ad Hoc networks, etc. technique for image
encryption[28]
Method Sharing Session Key Characteristics Encryption is performed using
component algorithm [25] block wise XOR operations. It
Characteristics Messages are protected can operate in color, gray scale
through radio links and are and binary images.
clear for network operator. Advantages It is reliable where
The algorithm operates so long cryptanalysis is quite difficult.
the communication is disputed It is robust.
to endanger public safely. Pitfalls The technique is relatively
Advantages It improves symmetric key slow.
encryption technique by Implementations Digital data protection, copy
providing non-repudiation and protection, etc.
end-to-end security to each
individual in communication. Method DJSA Symmetric key
Pitfalls Key Escrow Trust algorithm [29]
Organization cannot recover Characteristics Unlike the MSA method [30]
the session key. It has finite it uses a key matrix of size
computing capacity and less 65536 and each cell stores 2
power. character patterns.
Implementations Digital Mobile Advantages It provides high protection
communications, E-commerce against Brute force attack and
can encrypt a file of less than
Method Symmetric key encryption or equal to 2 MB.
algorithm based on 2-d Pitfalls If the file size is very big, the
geometry [26] process becomes slow.
Characteristics It includes both the properties Implementations If the file size is very big, the
of circle and circle centred process becomes slow.
angles. It provides high

978-1-4799-5748-4/14/$31.00 © 2014 IEEE 87


2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)

Method NJJSAA Symmetric key Method Symmetric key encryption


algorithm [31] algorithm based on linear
Characteristics The process performs key geometry[36]
exchange and XOR operations Characteristics Both substitution and
for both encryption and transposition techniques are
decryption. applied to secure a secret
Advantages It is better than other general image over any unreliable
cryptographic algorithms. It communication. It generates a
can encrypt both large and random matrix and shuffles
small files. the ciphered bytes among N
Pitfalls The process is slight lengthy. bytes of secret files.
Implementations Government sectors, banks, Advantages Robust and potential to the
database encryption, etc. security needs of digital
images. Correlation value for
Method DJMNA Symmetric key both secret and encrypted
algorithm [32] image is one.
Characteristics It combines both MGVC and Pitfalls -----------------------------
DJSA methods. The order of Implementations Medical, commercial and
these algorithms depends on military systems.
the random matrices
developed during the process.
Advantages The encrypted message is very Method Symmetric key encryption
hard to decrypt using any algorithm based on cyclic
Brute Force attack. elliptic curve and chaotic
Pitfalls The process is complex and system [37]
lengthy. Characteristics It provides authentication
Implementations Password encryption, mobile using neural networks. It
network, ATM network, etc. performs the encryption for
256-bit plain image to 256-bit
Method Symmetric key based RFID cipher image using eight 32-
authentication protocol [33] bit registers. Based on
Characteristics It implements three protocols piecewise non-linear chaotic
that use same block cipher by map, the method generates
implementing same RF based pseudorandom bit sequences
hardware. for round keys.
Advantages This protocol improves the Advantages Large key space, faster, good
RFID system by providing encryption effect and sensitive
security against various to small changes.
attacks at low computational Pitfalls If the change in media data is
cost. quite smaller than the
Pitfalls The process is lengthy. adjustable parameter ranging,
Implementations Communication networks, then the algorithm fails.
business houses, etc. Implementations Various business
requirements.
Method Wireless Secret key generation
algorithm in multiuser
networks [34] Method Secure protocol using the
Characteristics It works in multiuser networks property of Quantum Wave
and checks how such diversity Function [38]
affects secret key randomness. Characteristics At a given time, the state of a
Advantages It increases the randomness particle is managed by
performance and reduces the position and momentum. The
execution time. physical significance of a
Pitfalls Update of secret key is particular wave function
necessary for proper security. depends on a linear vector
space.
Implementations Various wireless Advantages It prevents attack on user’s
communication networks. password using quantum
computing efficiency. It

978-1-4799-5748-4/14/$31.00 © 2014 IEEE 88


2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)

prevents compromising Advantages It helps in faster RSA


passwords and can replace the factorization and can secure
bounded key length classical ECC. It provides a cost
encryption algorithms. effective service.
Pitfalls ------------------------------ Pitfalls To make the overall machine
Implementations Various hardware design cost effective, many
implementations. small FPGA modules are
designed. This requires extra
V. COMPARISON STUDY OF NEWLY space.
PROPOSED ASYMMETRIC KEY Implementations Useful tool for parallel
ALGORITHMS computational problems [13]

TABLE 4. COMPARISON TABLE FOR THE NEWLY Method Generation of a multimode


PROPOSED ASYMMETRIC KEY ALGORITHMS multiplier [7]
Characteristics The multimode multiplier
Method Prime Number Generation[1]
consists of four phases and
Characteristics Prime numbers are generated uses a series of right shifting
randomly from a large series and additions.
using the divisibility tests.
Advantages The multimode multiplier
Advantages Scrambled messages using consists of four phases and
two prime factors become uses a series of right shifting
difficult to break. So, data and additions.
remains highly secured.
Pitfalls The multimode multiplier
Pitfalls The bit length of the prime wastes power if operated in
numbers should be pre AES mode. The power
determined. Generating big consumption is high.
prime numbers is quite
Implementations It can be applied to various
difficult.
polynomial fields and helps in
Implementations Money transfer, business matrix-vector multiplications.
transactions, diplomatic
communications, books,
Method Master-key-encryption-based
audio, video, etc.
multiple group key
management scheme (MKE-
Method Image security through MGKM) [8]
asymmetric watermarking
Characteristics The MKE-MGKM is used to
algorithm [2][3][4][5]
tackle various multicast
Characteristics Embedding and detection are groups existing in a single
done separately using private network.
and public key respectively. It
Advantages The MKE-MGKM is simple
is based on linear algebra.
and requires less memory
Advantages This algorithm is highly storage for the keys.
efficient as it provides a
Pitfalls Communication overhead is
double layer security level for
greater than storage overhead.
protecting digital data. It is
Implementations Various broadcasting like TV
simple and saves the
and wireless mobile networks.
computational cost.
Pitfalls If a particular integer is big
Method Asymmetric Public Key
then the watermark is not
Traitor Tracing Schemes [9]
detected to the original
encrypted images. Characteristics It uses a multiplicative cyclic
group of very big prime order
Implementations Copy protection frameworks
and then it evaluates an
[12]
oblivious polynomial.
Advantages It traces the traitor, in digital
Method Cryptanalysis using
content, responsible for the
COPACOBANA[6]
construction of pirate keys,
Characteristics It consists of 120 field
ensuring non-repudiation.
programmable gate arrays. It
Pitfalls Broadcasting streams are quite
can solve various
expensive. There is a trade off
computations without any
between protection and
mathematical breakthrough.

978-1-4799-5748-4/14/$31.00 © 2014 IEEE 89


2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)

content distribution. Method Method for increasing security


Implementations Various entertainment devices in RSA [35]
like TV. Characteristics It eliminates the distribution of
n large numbers whose factors
Method Feigenbaum encryption become difficult to design
method of messages [10] using RSA algorithm.
Characteristics It uses two pairs of Advantages It protects the messages from
asymmetric private keys. It the mathematical factorization
makes use of a logistic attacks which the general RSA
difference equation. algorithm suffers from.
Advantages It, specially the double F- Pitfalls It increases the time
sequence coding, makes a complexity.
better use of the encryption Implementations Various hardware and
technique in the messages and software
can confuse the attacker who
employs nearly the correct Method Model based on Pretty Good
keys. Privacy (PGP) to secure E-
Pitfalls The requirements are time Commerce through
consuming which cannot be Asymmetric Key encryption
satisfied by an efficient technique [39]
computer program. Characteristics It implements the RSA
Implementations Various online communication algorithm for encryption or
mediums. decryption purposes. It is
based on PGP and dual
Method Asymmetric DNA algorithm signature method.
[11] Advantages It provides security issues at
Characteristics It encrypts the plain text using various levels like transaction
the existing biological level, reply attacks, mutual
information from the DNA authentication, Network and
public databases. It is transport level, etc.
implemented in BioJava and Pitfalls --------------------
Matlab Implementations Biometric system, Internet
Advantages It does not require several banking, ATM machine, Key
iterations for derivation of exchange and Digital
keys and the keys can be
signature, etc.
retrieved. It is more reliable
and powerful than OTP DNA
algorithm.
Method Technique based on Elliptical
Pitfalls The process is lengthy and
Curve Cryptography (ECC)
kills the execution time.
through the implementation of
Implementations Researches in DNA
hidden generator point in
computations.
WSNs [40]
Characteristics Digits are extended beyond
Method Key assessment scheme for
two bits for representing k,
secure broadcasting [23]
where k is any integer in prime
Characteristics The scheme employs ECC field as the ECC is represented
cryptographic algorithm. The as T=k*G where G are the
number of encryption keys points on elliptic curve. The
depends on the access control 192-bit values are stored in a
policies. 24*8 array.
Advantages It is highly efficient. Storage Advantages It provides better security
of decryption keys in tamper against the physical node
resistance device is easier. capture and man in the middle
Pitfalls Security solutions especially attacks.
in case of smart cards are not Pitfalls The communication cost is
cleared. high as it requires multiple
Implementations TV systems, electronic computations.
subscription, etc. Implementations Various Wireless Sensor
Networks

978-1-4799-5748-4/14/$31.00 © 2014 IEEE 90


2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)

[1] Arun Kejariwal, “ Cryptic primes”, IEEE


Method Hardware/software codesign Potentials, pp. 43-45, Feb./Mar. 2004, IEEE
of ECC for Resource
constrained applications [41] [2] Minoru Kuribayashi and Hatsukazu Tanaka,
Characteristics It helps in binary field “Fingerprinting Protocol for Images Based on
multiplication in software. It Additive Homomorphic Property”, IEEE
also offers instruction set Transactions on Image Processing, vol. 14, no. 12,
extensions and presented a pp. 2129-2139, Dec. 2005, IEEE
coprocessor for binary
multiplication. [3] Subramania Sudharsanan, ” Shared Key
Advantages It is highly efficient in terms Encryption of JPEG Color Images”, IEEE
of performance and area. Transactions on Consumer Electronics, vol. 51, no.
Pitfalls Nothing has been mentioned 4, pp. 1204-1211, Nov. 2005, IEEE
about power consumption.
Implementations Brand protections, etc. [4] G. Boato, N. Conci, and V. Conotter, F.G.B. De
Natale, and C. Fontanari, “Multimedia asymmetric
VI. FUTURE SCOPE watermarking and encryption”, Electronics Letters,
vol. 44 no. 9, April 2008, IEEE
For efficient data transmission, cryptography is
an ultimate solution. Many algorithms have [5] Boato, G., De Natale, F.G.B., and Fontanari, C.:
developed so far, based on both Symmetric and ‘An improved asymmetric watermarking scheme
Asymmetric key Cryptography. The algorithms are suitable for copy protection’, IEEE Trans. Signal
effective in ensuring data privacy, integrity, Process., 54 (7), pp. 2833–2834, 2006, IEEE
authenticity and non-repudiation. However, there
are certain areas that still remain open. Quantum [6] Tim Gu¨neysu, Timo Kasper, Martin Novotn_y,
cryptography is considered to be an excellent Christof Paar, and Andy Rupp, “Cryptanalysis with
replacement for Diffie-Hellman algorithm as the COPACOBANA”, IEEE Transactions on
data transferred through it highly secured. But it Computers, vol. 57, no. 11, pp. 1498-1513, Nov.
cannot provide protection against the classical 2008, IEEE
bucket brigade attacks. Methods could be
developed to overcome this problem. Scrambled [7] Chen-Hsing Wang, Chieh-Lin Chuang, and
messages using two prime factors provide high Cheng-Wen Wu, “An Efficient Multimode
security to data. Methods could be generated to Multiplier Supporting AES and Fundamental
remove the difficulty of generating large prime Operations of Public-Key Cryptosystems”, IEEE
numbers. Transactions on Very Large Scale Integration
(VLSI) Systems, vol. 18, no. 4, pp. 553-563, April
VII. CONCLUSION 2010, IEEE

Both Symmetric and Asymmetric Key [8] Min-Ho Park, Young-Hoon Park, Han-You
algorithms are highly efficient in securing the Jeong, and Seung-Woo Seo, “Key Management for
transferred data over any communication medium. Multiple Multicast Groups in Wireless Networks”,
In this paper, we have highlighted the basic as well IEEE Transactions on Mobile Computing, vol. 12,
as proposed algorithms related to these no. 9, pp. 1712-1723, Sept. 2013, IEEE
cryptographic techniques. In Symmetric Key
Cryptography, a single key is for both encryption [9] Aggelos Kiayias and Moti Yung, “Breaking and
and decryption purposes. The sharing of this key Repairing Asymmetric Public-Key Traitor
becomes sometimes insecure. On the other hand, Tracing”, pp.1-16, IEEE
Asymmetric Key Cryptography uses two separate
keys to prevent any unethical access to the data. [10] Robert M. Bevensee, “Feigenbaum encryption
The public key remains public and the private key of messages”, IEEE Potentials, pp. 39-41, Feb.
is not shared. This technique ensures better security
/Mar. 2001, IEEE
than the former. Moreover, the use of Digital
Signatures in case of Asymmetric Key
[11] Radu Terec, Mircea-Florin Vaida, Lenuta
Cryptography provides high data confidentiality
and non-repudiation. Yet, Symmetric Key Alboaie, and Ligia Chiorean, “DNA Security using
Cryptography has many well known applications Symmetric and Asymmetric Cryptography”, The
because of its simplicity. Society of Digital Information and Wireless
Communications, vol-1, no-1, pp. 34-51, 2011,
REFERENCES IEEE

978-1-4799-5748-4/14/$31.00 © 2014 IEEE 91


2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)

[12] Massimo Alioto, Massimo Poli, and Santina Chaotic System”, IEEE Transactions on Circuits
Rocchi, “Differential Power Analysis Attacks to and Systems—I: Regular Papers, vol. 53, no. 4, pp.
Precharged Buses: A General Analysis for 848-857, April 2006, IEEE
Symmetric-Key Cryptographic Algorithms”, IEEE
Transactions on Dependable and Secure [22] Luca Breveglieri, Israel Koren, and Paolo
Computing, vol. 7, no. 3, pp. 226-239, July-Sept. Maistri, “An Operation-Centered Approach to Fault
2010, IEEE Detection in Symmetric Cryptography Ciphers”,
IEEE Transactions on Computers, vol. 56, no. 5,
[13] Massimo Alioto, Massimo Poli, and Santina pp. 635-649, May 2007, IEEE
Rocchi, “A General Power Model of Differential
Power Analysis Attacks to Static Logic Circuits”, [23] Elisa Bertino, Ning Shang, and Samuel S.
IEEE Transactions on Very Large Scale Wagstaff Jr., “An Efficient Time-Bound
Integration (VLSI) Systems, vol. 18, no. 5, pp. 711- Hierarchical Key Management Scheme for Secure
724, May 2010 , IEEE Broadcasting”, IEEE Transactions on Dependable
and Secure Computing, vol. 5, no. 2, pp. 65-70,
[14] Sean O’Melia and Adam J. Elbirt, “Enhancing April-June 2008, IEEE
the Performance of Symmetric-Key Cryptography
via Instruction Set Extensions”, IEEE Transactions [24] Chung-Ming Ou,” Design of Block Ciphers by
on Very Large Scale Integration (VLSI) Systems, Simple Chaotic Functions”, IEEE Computational
vol. 18, no. 11, pp. 1505-1518, Nov. 2010, IEEE Intelligence Magazine, pp.54-59, May 2008, IEEE

[15] Mehran Mozaffari-Kermani and Arash [25] Hsiao-Kuang Wu, Shu-ching Yang, and Yung-
Reyhani-Masoleh, “Efficient and High- Tai Lin, “The Sharing Session Key Component
Performance Parallel Hardware Architectures for (SSKC) Algorithm for End-to-End Secure Wireless
the AES-GCM”, IEEE Transactions on Computers, Communication”, pp. 242-250, IEEE
vol. 61, no. 8, pp. 1165-1178, Aug. 2012, IEEE
[26] Mohammad Jabed Morshed Chowdhury and
[16] Miodrag J. Mihaljevic´, Ryuji Kohno, Tapas Pal, “A New Symmetric Key Encryption
“Cryptanalysis of Fast Encryption Algorithm for Algorithm based on 2-d Geometry”, 2009
Multimedia FEA-M”, IEEE Communications International Conference on Electronic Computer
Letters, vol. 6, no. 9, pp. 382-384, Sept. 2002, Technology, pp. 541-544, IEEE
IEEE
[27] Wu Suyan, Li Wenbo, and Hu Xiangyi,
[17] Ahmet M. Eskicioglu and Edward J. Delp, “A “Study of Digital Signature with Encryption Based
KEY TRANSPORT PROTOCOL BASED ON on Combined Symmetric Key”, IEEE
SECRET SHARING APPLICATIONS TO
INFORMATION SECURITY”, IEEE Transactions [28] Bibhudendra Acharya, Sambit Kumar Shukla,
on Consumer Electronics, vol. 48, no. 4, pp. 816- Saroj Kumar Panigrahy,Sarat Kumar Patra, and
824, Nov. 2002, IEEE Ganapati Panda, “H-S-X Cryptosystem and Its
Application to Image Encryption”, 2009
[18] Miodrag J. Mihaljevic, “On Vulnerabilities International Conference on Advances in
and Improvements of Fast Encryption Algorithm Computing, Control, and Telecommunication
for Multimedia FEA-M”, IEEE Transactions on Technologies, pp.720-724, IEEE
Consumer Electronics, vol. 49, no. 4, pp. 1199-
1207, Nov. 2003, IEEE [29] Dripto Chatterjee, Joyshree Nath, Suvadeep
Dasgupta, and Asoke Nath, “A new Symmetric key
[19] Markus Volkmer and Sebastian Wallner, Cryptography Algorithm using extended MSA
“Tree Parity Machine Rekeying Architectures”, method: DJSA symmetric key algorithm”, 2011
IEEE Transactions on Computers, vol. 54, no. 4, International Conference on Communication
pp.421-427, April 2005, IEEE Systems and Network Technologies, pp. 89-94,
IEEE
[20] Adam J. Elbirt and Christof Paar, “An
Instruction-Level Distributed Processor for [30] A.Nath, S.Ghosh, and M.A.Mallik,
Symmetric-Key Cryptography”, IEEE Transactions “Symmetric key cryptography using random key
on Parallel and Distributed Systems, vol. 16, no. 5, generator”, Proceedings of International
pp. 468-480, May 2005, IEEE conference on SAM-2010 held at Las Vegas(USA)
12-15 July,2010, vol-2,pp. 239- 244
[21] Ranjan Bose and Saumitr Pathak, “A Novel
Compression and Encryption Scheme Using [31] Neeraj Khanna, Joyshree Nath, Joel James,
Variable Model Arithmetic Coding and Coupled Amlan Chakrabarti, Sayantan Chakraborty, and

978-1-4799-5748-4/14/$31.00 © 2014 IEEE 92


2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)

Asoke Nath, “New Symmetric key Cryptographic Conference on Communication Systems and
algorithm using combined bit manipulation and Network Technologies, pp.776-781, IEEE
MSA encryption algorithm: NJJSAA symmetric
key algorithm”, 2011 International Conference on [40] Ravi Kishore Kodali, “ECC with Hidden
Communication Systems and Network Generator Point in WSNs”, 2014 IEEE Region 10
Technologies, pp. 125-130, IEEE Symposium, pp. 131-136, IEEE

[32] Debanjan Das, Megholova Mukherjee, Neha [41] Andrea Höller, Norbert Druml, Christian
Choudhary, Asoke Nath, and Joyshree Nath, “An Kreiner, Christian Steger, and Tomaz Felicijan,
Integrated Symmetric key Cryptography Algorithm “Hardware/Software Co-Design of Elliptic-Curve
using Generalised modified Vernam Cipher method Cryptography for Resource-Constrained
and DJSA method: DJMNA symmetric key Applications”, DAC ’14 June 01 - 05 2014, IEEE
algorithm”, 2011 World Congress on Information
and Communication Technologies, pp. 1199-1204, [42]www.webopedia.com/TERM/S/symmetric_key
IEEE _cryptography.html

[33] Guangyu Zhu and Gul N. Khan, [43]voices.yahoo.com/comparing-symmetric-


“SYMMETRIC KEY BASED RFID asymmetric-key-encryption-6329400.html
AUTHENTICATION PROTOCOL WITH A
SECURE KEY-UPDATING SCHEME”, 2013 [44]www.cs.usfca.edu/~brooks/S04classes/cs480/le
26th IEEE Canadian Conference of Electrical And ctures/algs.pdf
Computer Engineering (CCECE), IEEE
[45]www.encryptionanddecryption.com/algorithms
[34] Seon Yeob Baek and Jongwook Park, “A /asymmetric_algorithms.html
Study on Wireless Secret Key Randomness in
Multiuser Networks”, ICTC 2013, pp. 1048-1052, [46]scialert.net/fulltext/?doi=itj.2013.1818.1824
IEEE
[47] www.vocal.com/cryptography/tdes/
[35] Rohit Minni, Kaushal Sultania, Saurabh
Mishra, and Prof Durai Raj Vincent, “An [48]home.cyber.ee/ahtbu/CDS2011/SandraNetsajev
Algorithm to Enhance Security in RSA”, 4th aSlides.doc
ICCCNT 2013, pp. 1-4, IEEE
[49]searchsecurity.techtarget.com/definition/Diffie-
[36] Prabir Kr. Naskar, Ayan Chaudhuri, and Atal Hellman-key-exchange
Chaudhuri, ”A Secure Symmetric Image
Encryption Based on Linear Geometry”, 2014 [50]learningnetwork.cisco.com/servlet/.../WP_Pal
Applications and Innovations in Mobile Computing mgren_DH.pdf
(AIMoC), pp. 67-74, IEEE
[51]searchsecurity.techtarget.com/definition/elliptic
[37] Ankita Baheti, Lokesh Singh, and Asif Ullah al-curve-cryptography
Khan, “Proposed Method for Multimedia Data
Security Using Cyclic Elliptic Curve, Chaotic [52]www.ehow.com/info_12226350_advantages-
System and Authentication using Neural Network”, disadvantages-elliptic-curve-cryptography-
2014 Fourth International Conference on wireless-security.html
Communication Systems and Network
Technologies”, pp. 664-668,IEEE [53]vanilla47.com/PDFs/Cryptography/Miscellene
a/Eliptic%20Curve%20Cryptography/A_tutorial_of
[38] Wafa Elmannai, Khaled Elleithy, Varun _elliptic_curve_cryptography.pdf
Pande, and Elham Geddeda, “Quantum Security
using Property of a Quantum Wave Function”, [54]searchsecurity.techtarget.com/definition/Digital
IEEE -Signature-Standard

[39] Ankur Chaudhary, Khaleel Ahmad, and M.A. [55] lerablog.org/technology/data-


Rizvi, “E-commerce Security Through Asymmetric security/advantages-and-disadvantages-of-digital-
Key Algorithm”, 2014 Fourth International signatures/

978-1-4799-5748-4/14/$31.00 © 2014 IEEE 93

View publication stats

You might also like