IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 6 - Issue 7, July 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Review Of Encryption Algorithms-RSA And Diffie-Hellman

[Full Text]

 

AUTHOR(S)

Nilesh A. Lal

 

KEYWORDS

Cryptography, Diffie Hellman, Network Security, Public key, Private key, RSA, Symmetric

 

ABSTRACT

Network security is protecting data and message from cybercrime. Cryptography system is designed freely to communicate over a computer network. It is a process where sender sends encrypted message to the recipient. Symmetric encryption is known as the single key encryption. RSA algorithm is a symmetric key encryption.it uses public key and private key. Diffie Hellman cryptography is where both parties exchange secrets keys to encrypt message.

 

REFERENCES

[1]. I. Wikimedia Foundation, "Network Security," 2017. [Online]. Available: https://en.wikipedia.org/wiki/Network_security. [Accessed 14 03 2017].

[2]. K. H. Rosen, Cryptography Theory and Practice, 3rd ed., University of Waterloo.

[3]. "Cryptography Benefits & Drawbacks," [Online]. Available: https://www.tutorialspoint.com/cryptography/benefits_and_drawbacks.htm. [Accessed 23 03 2017].

[4]. W. Stallings, Network Security Essentials, 4th ed., New York: Pearson Education, Inc, 2011.

[5]. "Symmetric vs. Asymmetric Encryption What are differences?," [Online]. Available: https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences. [Accessed 23 03 2017].

[6]. "Description of Symmetric and Asymmetric Encryption," 2007. [Online]. Available: https://support.microsoft.com/en-us/help/246071/description-of-symmetric-and-asymmetric-encryption. [Accessed 23 03 2017].

[7]. M. Higashi, "SYMMETRIC VS ASYMMETRIC ENCRYPTION," 2013. [Online]. Available: https://www.ciphercloud.com/blog/cloud-information-protection-symmetric-vs-asymmetric-encryption/. [Accessed 24 03 2017].

[8]. R. G. Anjali Patil, "A Comparative Survey Of Symmetric Encryption," INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, vol. 2, no. 8, p. 62, 2013.

[9]. A. H. A. Hadi, "A Survey On Some Encryption Algorithms And," INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, vol. 2, no. 12, p. 286, 2013.

[10]. S. Blanda, "RSA Encryption Keeping the Internet Secure," 2014. [Online]. Available: http://blogs.ams.org/mathgradblog/2014/03/30/rsa/. [Accessed 24 03 2017].

[11]. F. H. a. F. R. Michael Cobb, "RSA algorithm (Rivest-Shamir-Adleman)," 2014. [Online]. Available: http://searchsecurity.techtarget.com/definition/RSA. [Accessed 24 03 2017].

[12]. H. M. J. Ali Makhmali, "Comparative Study On Encryption Algorithms," INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, vol. 2, no. 6, p. 44, 2013.
[13]. D. Chauhan, "RSA and Diffie-Hellman Algrithm," 2016. [Online]. Available: https://www.slideshare.net/daxeshchauhan/rsa-and-diffie-hellman-algorithms-64170629. [Accessed 24 03 2017].

[14]. E. E. Classes, "Diffie Hellman Key Exchange in Hindi for Symmetric Key Encryption System With Example," 2016. [Online]. Available: https://www.youtube.com/watch?v=_M2Ea_3DRGA. [Accessed 24 03 2017].

[15]. K.Suganya, "Performance study on Diffie Hellman," INTERNATIONAL JOURNA L FOR RES EARCH IN AP PL I ED SC IENC E, vol. 2, no. 3, pp. 68-75, 2014.