SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online),
INTERNATIONAL JOURNAL OF MANAGEMENT (IJM)
Volume 4, Issue 6, November - December (2013)
ISSN 0976-6502 (Print)
ISSN 0976-6510 (Online)
Volume 4, Issue 6, November - December (2013), pp. 209-212
© IAEME: www.iaeme.com/ijm.asp
Journal Impact Factor (2013): 6.9071 (Calculated by GISI)
www.jifactor.com

IJM
©IAEME

DISTINGUISH FROM SYMMETRIC AND ASYMMETRIC CRYPTO
SYSTEMS. CITE THE STRENGTHS AND SHORTCOMINGS OF THE EACH
SYSTEM
V. Sridevi1, V. Sumathi2 and M. Guru Prasad3
1

2

Department of Biotechnology, Sri Venkateswara University, Tirupati, A.P
Department of Biotechnology, Sri Padmavati Mahila Visvavidyalayam, Tirupati, A.P.
3
Department of Biochemistry, Bharatiyar University, Coimbatore, Chennai.

ABSTRACT
In a symmetric cipher, both parties must use the same key for encryption and decryption.
This means that the encryption key must be shared between the two parties before any messages can
be decrypted. Symmetric systems are also known as shared secret systems or private key systems.
Symmetric ciphers are significantly faster than asymmetric ciphers, but the requirements for key
exchange make them difficult to use. In an asymmetric cipher, the encryption key and the decryption
keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is
shared publicly. The second key, the private key, should never be shared with anyone.When you
send a message using asymmetric cryptography, you encrypt the message using the recipients public
key. The recipient then decrypts the message using his private key. That is why the system is called
asymmetric. Because asymmetric ciphers tend to be significantly more computationally intensive,
they are usually used in combination with symmetric ciphers to implement effect public key
cryptography. The asymmetric cipher is used to encrypt a session key and the encrypted session key
is then used to encrypt the actual message. This gives the key-exchange benefits of asymmetric
ciphers with the speed of symmetric ciphers.
1. INTRODUCTION
Throughout the history of cryptography, hundreds of cryptosystems have been developed.
The earliest ones, as well as many later ones, relied on the complete secrecy in transferring keys
between the sender and recipient. These kinds of systems, called secret key cryptosystem, have just a
single key which is used for both encryption and decryption; therefore, these systems are more
frequently known as symmetric cryptosystems. In contrast to a symmetric cryptosystem, an
asymmetric cryptosystem is associated with a pair of keys; therefore, not everything related to the
cryptosystem needs to be kept secret. This kind of a cryptosystem is also called public-key
209
International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online),
Volume 4, Issue 6, November - December (2013)

cryptosystem. A public key cryptosystem consists of a public key, which is used for encryption, and
a private key, used for decryption. Therefore, anybody can encrypt plaintext since the encryption key
is available to everyone, but only the holders of the private key corresponding to the public key used
for encryption can decrypt the ciphertext [1, 2].
The first asymmetric cryptosystems appeared in 1970s to address the problem of key
management in symmetric cryptography. In 1976, Whitfield Diffie and Martin Hellman published a
key management scheme that was the predecessor to the first public-key cryptosystems; it later
became known as the Diffie-Hellman Key Exchange Protocol. Later, several asymmetric
cryptosystems were developed, including ElGamal, Rabin, and RSA cryptosystems [6,2,1].
The public-key cryptosystems rely heavily on mathematical functions known as trapdoor
functions; these are easy to apply in one direction but extremely difficult to apply in the inverse,
which is required for decryption of the ciphertext [1]. The major difference between the main
asymmetric cryptosystems is the function used to produce the public key. Many of them rely on
factoring a large number into two large prime numbers that compose the given number. This is not a
trivial task, especially when each of the primes generally have more than 100 digits, which is usually
the case in well-designed cryptosystems.
However, there are other mechanisms used to derive public keys that we will briefly explain
in the following sections.
1.1 The Diffie-Hellman Key Exchange Protocol
The Diffie-Hellman Key Exchange Protocol, often shortened to simply Diffie-Hellman, was
invented in 1976 through the collaboration of Whitfield Diffie and Martin Hellman ([9], [1]). DiffieHellman is not a cryptosystem; rather, it is a means for two parties to jointly produce a shared secret
key over an insecure communications channel with minimal risk of a third party obtaining the key. In
fact, Diffie-Hellman was the first such method. Diffie-Hellman accomplishes this by taking
advantage of the properties of multiplicative groups of integers modulo that is, Zon. Specifically, we
select a prime number for, the modulo value of the group, and we select a prime number as the
generator of the group. These two conditions ensure that Zon will always be a cyclic group this is the
property needed for Diffie-Hellman to work as expected.
The key to Diffie-Hellman, of course, is that Alice and Bob end up with the same shared
secret key in steps 4 and 5 of the above algorithm. This shared secret can be used to establish a
secure communications channel. Considering this allows us to understand that the Diffie-Hellman
Key Exchange Protocol is an excellent tool that can be used to securely establish a secure
communications channel when only insecure means of communication are available.
1.2 ElGamal
The ElGamal encryption system was developed by Taher Elgamal in 1984 ([8], [1]). It is
based heavily on the same principle as Diffie-Hellman: a cyclic multiplicative group modulo some
prime number.
Generally speaking, of course, the number of possible messages will far exceed p − 1. To
remedy this, ElGamal is generally used multiple times on several pieces of the message. One obvious
disadvantage of ElGamal, consequently, is that any ciphertext generated using ElGamal is twice as
large as the plaintext.
Another disadvantage is that p−1 must generally be larger than the number of possible
messages, simply because this number is unlikely to be prime.
It is easy to verify that ElGamal is indeed a valid cryptosystem: cx1
´ (gk)x ´ (gx)k ´ yk ´c2/m (mod p).

210
International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online),
Volume 4, Issue 6, November - December (2013)

1.3 Rabin Cryptosystem
The Rabin cryptosystem is another example of an asymmetric cryptosystem. It was created
by Michael O. Rabin in 1979. Rabin’s work has theoretical importance because it provided the first
provable security for public-key cryptosystems [6]. It can be proven that recovering the entire
plaintext from the ciphertext has same complexity as factoring large numbers [1,7].
The effectiveness of this algorithm has been questioned mainly because of the fact that it produces 4
results, one correct and 3 false. Identifying the correct one is usually performed with a guess. If the
plaintext is intended to represent a text message, guessing is not difficult; however, if the plaintext is
intended to represent a numerical value, this issue becomes a problem that must be solved with some
kind of disambiguation scheme. It is possible to choose plaintexts with special structures, or to add
padding, to eliminate this problem. The most common way of implementing disambiguation is
known as Blum disambiguation, which is based on characteristics of pseudorandom number
generator [6].
The efficiency of the Rabin cryptosystem is at least as good as that of the RSA cryptosystem.
In Rabin, encryption is computed by calculating a square modulon. This is more efficient than RSA,
which requires the calculation of at least a cube. For decryption, the results of congruence are applied
through the Chinese remainder theorem, along with two modular exponentiations. Here the
efficiency is comparable to RSA. Disambiguation introduces additional computational costs, which
is the main reason preventing the Rabin cryptosystem from finding widespread practical use.
1.4 RSA
RSA is the most commonly used cryptosystem these days. It was invented in 1977 by Ron
Rivest, Adi Shamir, and Len Adleman, where the name RSA comes from [4].The most important
part of asymmetric algorithms is the key generation.
The security of RSA is based on difficulty of factoring large prime numbers. Therefore, the
choice of primes is very crucial, which raises the biggest issue. The problem with sufficiently large
primes is to check their primality, to compute gcd(e, Á(n)) to make sure they are relatively prime,
and to compute the private key d satisfying ed ´ 1 (mod Á(n)). There are several algorithms that can
speed up some calculations required for encryption and decryption of a message using the RSA
algorithm, which make this cryptosystem very likely to be used these days for transmitting secure
information ([4], [5]).
2. WEAKNESSES IN ASYMMETRIC CRYPTOSYSTEMS
Even though asymmetric cryptosystems are relatively secure, there are a few issues that do
not guarantee the complete safety and invulnerability of these kinds of cryptosystems. One of the
main problems in public-key cryptography is to prove that the public key is authentic, i.e., it has not
been replaced with another key by a malicious user. There are two main approaches to address this
problem. The first approach relies on a third party, which acts as a certificate authority that certifies
the ownership of key. The other approach is the “web of trust” to which a user has access through a
password [2].
As any other cryptosystem, the asymmetric one is vulnerable to brute-force attacks. However,
with a large enough key, the exhaustive search attack is not practical, and therefore, this type of
weakness can be reduced by enlarging the size of the key [2].
The other method of distributing private key of an asymmetric cryptosystem is through the
key translation center which acts as a trusted server between parties that do not directly share the key
between them. Each party shares a different key with the key translation center. The way this sharing
information works is that one person sends an encrypted message to the trusted server using its own

211
International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online),
Volume 4, Issue 6, November - December (2013)

key, and the center translates it to the message that can be decrypted using the other party’s key. To
accomplish this, the key transfer center maintains a secure database of users’ secret keys [3].
Another example of systems implicitly guaranteeing authenticity is the system using selfcertified public keys, which is exactly the same as the identity-based public key with the exception
that the manipulations of the public key are done by the individual user rather than the trusted third
party [3].
CONCLUSION
Asymmetric cryptosystems have become a popular way of encrypting data since their first
appearance in the 1970s. The main reason for development of these types of cryptosystems lies in the
security of key management and the vulnerability under malicious attacks. The asymmetric
cryptosystem contains a pair of keys, an encryption key, which is available to public, and a
decryption key, which is private.
REFERENCES
[1]

Mao, W., Modern Cryptography: Theory & Practice, Upper Saddle River, NJ: Prentice Hall
PTR, 2004.
[2] “Public-key cryptography,” Wikipedia,
<http://en.wikipedia.org/wiki/Public-key cryptography>
[3] Menezes, A., van Oorschot, P., and Vanstone, S. Handbook of applied cryptography, CRC
Press, 1996.
[4] “RSA algorithm,” <http://www.dimgt.com.au/rsa alg.html>
[5] “RSA cryptosystem,” <http://ww3.algorithmdesign.net/handouts/RSA.pdf>
[6] “Rabin cryptosystems,” Wikipedia, <http://en.wikipedia.org/wiki/Rabin cryptosystem>
[7] N. R. Wagner, The laws of cryptography: Rabin’s version of RSA,
<http://www.cs.utsa.edu/ wagner/laws/Rabin.html>
[8] “ElGamal encryption,” Wikipedia, <http://en.wikipedia.org/wiki/ElGamal encryption>
[9] “Diffie-Hellman key exchange,” Wikipedia,
<http://en.wikipedia.org/wiki/Diffie-Hellman key exchange>
[10] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using
Reconfigurable Hardware”, International Journal of Computer Engineering & Technology
(IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.
[11] Varun Shukla and Abhishek Choubey, “A Comparative Analysis of the Possible Attacks on
RSA Cryptosystem”, International Journal of Electronics and Communication Engineering
& Technology (IJECET), Volume 3, Issue 1, 2012, pp. 92 - 97, ISSN Print: 0976- 6464,
ISSN Online: 0976 –6472.

212

Mais conteúdo relacionado

Mais procurados

Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security EncryptionJoel Briza
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsdaxesh chauhan
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS SecurityAaron Zauner
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptographychauhankapil
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryptionphanleson
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017YogeshDhamke2
 

Mais procurados (15)

Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Ch9
Ch9Ch9
Ch9
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017B.sc . i.t.-sem..-v-net-copy-may-2017
B.sc . i.t.-sem..-v-net-copy-may-2017
 

Destaque

Performance Evaluation of Message Security Using Fractal Sieve with MMD
Performance Evaluation of Message Security Using Fractal Sieve with MMDPerformance Evaluation of Message Security Using Fractal Sieve with MMD
Performance Evaluation of Message Security Using Fractal Sieve with MMDijsptm
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemeEditor IJMTER
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...ijafrc
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Scalable Distributed Job Processing with Dynamic Load Balancing
Scalable Distributed Job Processing with Dynamic Load BalancingScalable Distributed Job Processing with Dynamic Load Balancing
Scalable Distributed Job Processing with Dynamic Load Balancingijdpsjournal
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
Optimization of machining parameters in edm of cfrp composite using taguchi t...
Optimization of machining parameters in edm of cfrp composite using taguchi t...Optimization of machining parameters in edm of cfrp composite using taguchi t...
Optimization of machining parameters in edm of cfrp composite using taguchi t...IAEME Publication
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Protection of server from syn flood attack
Protection of server from syn flood attackProtection of server from syn flood attack
Protection of server from syn flood attackIAEME Publication
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
 
Prediction of scour depth at bridge abutments in cohesive bed using gene expr...
Prediction of scour depth at bridge abutments in cohesive bed using gene expr...Prediction of scour depth at bridge abutments in cohesive bed using gene expr...
Prediction of scour depth at bridge abutments in cohesive bed using gene expr...IAEME Publication
 

Destaque (20)

Performance Evaluation of Message Security Using Fractal Sieve with MMD
Performance Evaluation of Message Security Using Fractal Sieve with MMDPerformance Evaluation of Message Security Using Fractal Sieve with MMD
Performance Evaluation of Message Security Using Fractal Sieve with MMD
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Scalable Distributed Job Processing with Dynamic Load Balancing
Scalable Distributed Job Processing with Dynamic Load BalancingScalable Distributed Job Processing with Dynamic Load Balancing
Scalable Distributed Job Processing with Dynamic Load Balancing
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
20320140507006 2-3
20320140507006 2-320320140507006 2-3
20320140507006 2-3
 
30120140507004
3012014050700430120140507004
30120140507004
 
50120140507007
5012014050700750120140507007
50120140507007
 
20320140507005
2032014050700520320140507005
20320140507005
 
40220140507002
4022014050700240220140507002
40220140507002
 
50120140507005 2
50120140507005 250120140507005 2
50120140507005 2
 
Optimization of machining parameters in edm of cfrp composite using taguchi t...
Optimization of machining parameters in edm of cfrp composite using taguchi t...Optimization of machining parameters in edm of cfrp composite using taguchi t...
Optimization of machining parameters in edm of cfrp composite using taguchi t...
 
30120140507008
3012014050700830120140507008
30120140507008
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Protection of server from syn flood attack
Protection of server from syn flood attackProtection of server from syn flood attack
Protection of server from syn flood attack
 
20320140507008
2032014050700820320140507008
20320140507008
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
Prediction of scour depth at bridge abutments in cohesive bed using gene expr...
Prediction of scour depth at bridge abutments in cohesive bed using gene expr...Prediction of scour depth at bridge abutments in cohesive bed using gene expr...
Prediction of scour depth at bridge abutments in cohesive bed using gene expr...
 
Exhibition stands
Exhibition standsExhibition stands
Exhibition stands
 

Semelhante a 10120130406026

Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxmustafaenayat
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
A Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA VariantsA Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA Variantsijsrd.com
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Techglyphs
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud ComputingIRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud ComputingIRJET Journal
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneSecurityTube.Net
 
Unit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptxUnit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptxSayeeKumarMadhesh
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comphanleson
 

Semelhante a 10120130406026 (20)

H42063743
H42063743H42063743
H42063743
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
 
Nt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm PaperNt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm Paper
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
A Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA VariantsA Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA Variants
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud ComputingIRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
IRJET- A Study Paper on Homomorphic Encryption in Cloud Computing
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
cryptography
cryptographycryptography
cryptography
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
Unit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptxUnit III Public Key Crypto Systems.pptx
Unit III Public Key Crypto Systems.pptx
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

10120130406026

  • 1. International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), INTERNATIONAL JOURNAL OF MANAGEMENT (IJM) Volume 4, Issue 6, November - December (2013) ISSN 0976-6502 (Print) ISSN 0976-6510 (Online) Volume 4, Issue 6, November - December (2013), pp. 209-212 © IAEME: www.iaeme.com/ijm.asp Journal Impact Factor (2013): 6.9071 (Calculated by GISI) www.jifactor.com IJM ©IAEME DISTINGUISH FROM SYMMETRIC AND ASYMMETRIC CRYPTO SYSTEMS. CITE THE STRENGTHS AND SHORTCOMINGS OF THE EACH SYSTEM V. Sridevi1, V. Sumathi2 and M. Guru Prasad3 1 2 Department of Biotechnology, Sri Venkateswara University, Tirupati, A.P Department of Biotechnology, Sri Padmavati Mahila Visvavidyalayam, Tirupati, A.P. 3 Department of Biochemistry, Bharatiyar University, Coimbatore, Chennai. ABSTRACT In a symmetric cipher, both parties must use the same key for encryption and decryption. This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems. Symmetric ciphers are significantly faster than asymmetric ciphers, but the requirements for key exchange make them difficult to use. In an asymmetric cipher, the encryption key and the decryption keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is shared publicly. The second key, the private key, should never be shared with anyone.When you send a message using asymmetric cryptography, you encrypt the message using the recipients public key. The recipient then decrypts the message using his private key. That is why the system is called asymmetric. Because asymmetric ciphers tend to be significantly more computationally intensive, they are usually used in combination with symmetric ciphers to implement effect public key cryptography. The asymmetric cipher is used to encrypt a session key and the encrypted session key is then used to encrypt the actual message. This gives the key-exchange benefits of asymmetric ciphers with the speed of symmetric ciphers. 1. INTRODUCTION Throughout the history of cryptography, hundreds of cryptosystems have been developed. The earliest ones, as well as many later ones, relied on the complete secrecy in transferring keys between the sender and recipient. These kinds of systems, called secret key cryptosystem, have just a single key which is used for both encryption and decryption; therefore, these systems are more frequently known as symmetric cryptosystems. In contrast to a symmetric cryptosystem, an asymmetric cryptosystem is associated with a pair of keys; therefore, not everything related to the cryptosystem needs to be kept secret. This kind of a cryptosystem is also called public-key 209
  • 2. International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), Volume 4, Issue 6, November - December (2013) cryptosystem. A public key cryptosystem consists of a public key, which is used for encryption, and a private key, used for decryption. Therefore, anybody can encrypt plaintext since the encryption key is available to everyone, but only the holders of the private key corresponding to the public key used for encryption can decrypt the ciphertext [1, 2]. The first asymmetric cryptosystems appeared in 1970s to address the problem of key management in symmetric cryptography. In 1976, Whitfield Diffie and Martin Hellman published a key management scheme that was the predecessor to the first public-key cryptosystems; it later became known as the Diffie-Hellman Key Exchange Protocol. Later, several asymmetric cryptosystems were developed, including ElGamal, Rabin, and RSA cryptosystems [6,2,1]. The public-key cryptosystems rely heavily on mathematical functions known as trapdoor functions; these are easy to apply in one direction but extremely difficult to apply in the inverse, which is required for decryption of the ciphertext [1]. The major difference between the main asymmetric cryptosystems is the function used to produce the public key. Many of them rely on factoring a large number into two large prime numbers that compose the given number. This is not a trivial task, especially when each of the primes generally have more than 100 digits, which is usually the case in well-designed cryptosystems. However, there are other mechanisms used to derive public keys that we will briefly explain in the following sections. 1.1 The Diffie-Hellman Key Exchange Protocol The Diffie-Hellman Key Exchange Protocol, often shortened to simply Diffie-Hellman, was invented in 1976 through the collaboration of Whitfield Diffie and Martin Hellman ([9], [1]). DiffieHellman is not a cryptosystem; rather, it is a means for two parties to jointly produce a shared secret key over an insecure communications channel with minimal risk of a third party obtaining the key. In fact, Diffie-Hellman was the first such method. Diffie-Hellman accomplishes this by taking advantage of the properties of multiplicative groups of integers modulo that is, Zon. Specifically, we select a prime number for, the modulo value of the group, and we select a prime number as the generator of the group. These two conditions ensure that Zon will always be a cyclic group this is the property needed for Diffie-Hellman to work as expected. The key to Diffie-Hellman, of course, is that Alice and Bob end up with the same shared secret key in steps 4 and 5 of the above algorithm. This shared secret can be used to establish a secure communications channel. Considering this allows us to understand that the Diffie-Hellman Key Exchange Protocol is an excellent tool that can be used to securely establish a secure communications channel when only insecure means of communication are available. 1.2 ElGamal The ElGamal encryption system was developed by Taher Elgamal in 1984 ([8], [1]). It is based heavily on the same principle as Diffie-Hellman: a cyclic multiplicative group modulo some prime number. Generally speaking, of course, the number of possible messages will far exceed p − 1. To remedy this, ElGamal is generally used multiple times on several pieces of the message. One obvious disadvantage of ElGamal, consequently, is that any ciphertext generated using ElGamal is twice as large as the plaintext. Another disadvantage is that p−1 must generally be larger than the number of possible messages, simply because this number is unlikely to be prime. It is easy to verify that ElGamal is indeed a valid cryptosystem: cx1 ´ (gk)x ´ (gx)k ´ yk ´c2/m (mod p). 210
  • 3. International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), Volume 4, Issue 6, November - December (2013) 1.3 Rabin Cryptosystem The Rabin cryptosystem is another example of an asymmetric cryptosystem. It was created by Michael O. Rabin in 1979. Rabin’s work has theoretical importance because it provided the first provable security for public-key cryptosystems [6]. It can be proven that recovering the entire plaintext from the ciphertext has same complexity as factoring large numbers [1,7]. The effectiveness of this algorithm has been questioned mainly because of the fact that it produces 4 results, one correct and 3 false. Identifying the correct one is usually performed with a guess. If the plaintext is intended to represent a text message, guessing is not difficult; however, if the plaintext is intended to represent a numerical value, this issue becomes a problem that must be solved with some kind of disambiguation scheme. It is possible to choose plaintexts with special structures, or to add padding, to eliminate this problem. The most common way of implementing disambiguation is known as Blum disambiguation, which is based on characteristics of pseudorandom number generator [6]. The efficiency of the Rabin cryptosystem is at least as good as that of the RSA cryptosystem. In Rabin, encryption is computed by calculating a square modulon. This is more efficient than RSA, which requires the calculation of at least a cube. For decryption, the results of congruence are applied through the Chinese remainder theorem, along with two modular exponentiations. Here the efficiency is comparable to RSA. Disambiguation introduces additional computational costs, which is the main reason preventing the Rabin cryptosystem from finding widespread practical use. 1.4 RSA RSA is the most commonly used cryptosystem these days. It was invented in 1977 by Ron Rivest, Adi Shamir, and Len Adleman, where the name RSA comes from [4].The most important part of asymmetric algorithms is the key generation. The security of RSA is based on difficulty of factoring large prime numbers. Therefore, the choice of primes is very crucial, which raises the biggest issue. The problem with sufficiently large primes is to check their primality, to compute gcd(e, Á(n)) to make sure they are relatively prime, and to compute the private key d satisfying ed ´ 1 (mod Á(n)). There are several algorithms that can speed up some calculations required for encryption and decryption of a message using the RSA algorithm, which make this cryptosystem very likely to be used these days for transmitting secure information ([4], [5]). 2. WEAKNESSES IN ASYMMETRIC CRYPTOSYSTEMS Even though asymmetric cryptosystems are relatively secure, there are a few issues that do not guarantee the complete safety and invulnerability of these kinds of cryptosystems. One of the main problems in public-key cryptography is to prove that the public key is authentic, i.e., it has not been replaced with another key by a malicious user. There are two main approaches to address this problem. The first approach relies on a third party, which acts as a certificate authority that certifies the ownership of key. The other approach is the “web of trust” to which a user has access through a password [2]. As any other cryptosystem, the asymmetric one is vulnerable to brute-force attacks. However, with a large enough key, the exhaustive search attack is not practical, and therefore, this type of weakness can be reduced by enlarging the size of the key [2]. The other method of distributing private key of an asymmetric cryptosystem is through the key translation center which acts as a trusted server between parties that do not directly share the key between them. Each party shares a different key with the key translation center. The way this sharing information works is that one person sends an encrypted message to the trusted server using its own 211
  • 4. International Journal of Management (IJM), ISSN 0976 – 6502(Print), ISSN 0976 - 6510(Online), Volume 4, Issue 6, November - December (2013) key, and the center translates it to the message that can be decrypted using the other party’s key. To accomplish this, the key transfer center maintains a secure database of users’ secret keys [3]. Another example of systems implicitly guaranteeing authenticity is the system using selfcertified public keys, which is exactly the same as the identity-based public key with the exception that the manipulations of the public key are done by the individual user rather than the trusted third party [3]. CONCLUSION Asymmetric cryptosystems have become a popular way of encrypting data since their first appearance in the 1970s. The main reason for development of these types of cryptosystems lies in the security of key management and the vulnerability under malicious attacks. The asymmetric cryptosystem contains a pair of keys, an encryption key, which is available to public, and a decryption key, which is private. REFERENCES [1] Mao, W., Modern Cryptography: Theory & Practice, Upper Saddle River, NJ: Prentice Hall PTR, 2004. [2] “Public-key cryptography,” Wikipedia, <http://en.wikipedia.org/wiki/Public-key cryptography> [3] Menezes, A., van Oorschot, P., and Vanstone, S. Handbook of applied cryptography, CRC Press, 1996. [4] “RSA algorithm,” <http://www.dimgt.com.au/rsa alg.html> [5] “RSA cryptosystem,” <http://ww3.algorithmdesign.net/handouts/RSA.pdf> [6] “Rabin cryptosystems,” Wikipedia, <http://en.wikipedia.org/wiki/Rabin cryptosystem> [7] N. R. Wagner, The laws of cryptography: Rabin’s version of RSA, <http://www.cs.utsa.edu/ wagner/laws/Rabin.html> [8] “ElGamal encryption,” Wikipedia, <http://en.wikipedia.org/wiki/ElGamal encryption> [9] “Diffie-Hellman key exchange,” Wikipedia, <http://en.wikipedia.org/wiki/Diffie-Hellman key exchange> [10] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using Reconfigurable Hardware”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [11] Varun Shukla and Abhishek Choubey, “A Comparative Analysis of the Possible Attacks on RSA Cryptosystem”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 1, 2012, pp. 92 - 97, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. 212