Symmetric versus Asymmetric Cryptographic Techniques and Security Issues under Various Applications

Blerina Çeliku, Rafail Prodani, Klajdi Qafzezi

Abstract


There are so many different scenarios and applications over the Internet when we send or receive sensitive data and it is crucial to protect that data from unauthorized users. Cryptography and encryption are very common in altering data in a secret manner, encrypting communication or using certificates about websites. In this era, the security for the data has become highly important since the communication by transmitting of digital products over the open network occur very frequently. The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. Performance and implementation cost are crucial concerns dealing with cryptographic algorithms used in several practical applications. Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. Many encryption algorithms are widely available and used in information security. They have changed a lot form the basic ciphers to modern algorithms and it is known that specific algorithms are best suited in specific cases. Symmetric or asymmetric, encryption techniques are used frequently and are very common but there some features that dictate their use. In this paper, we study these categories and compare completely the most common cryptographic algorithms in use nowadays.


Keywords


Symmetric, asymmetric, encryption, performance, security.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

Copyright © 2016 by Global Publishing Corporation

ISSN: 2394-501X

For any Technical Support contact us at editorgjct@gmail.comeditor@gpcpublishing.com.