Saturday, 04 May, 2024

+91-9899775880

011-47044510

011-49075396

Comparative Analysis of Key Exchange Algorithms in Cryptography and its Implementation

IMS Manthan (The Journal of Mgt., Comp. Science & Journalism)

Volume 8 Issue 2

Published: 2013
Author(s) Name: Aakanksha Chopra | Author(s) Affiliation: Asst. Prof. (IT), Jagan Inst. of Mgt. Studies (JIMS), New Delhi, India.
Locked Subscribed Available for All

Abstract

Internet today which is the main source of information access is becoming intricate to supervise and manage. Protection of network these days is becoming a very serious facet when the degree of data to be shared is large and complex. The critical concern today is that how the secure data communication over the network can be maintained and also how can data be protected so that it is not disclosed to illegitimate users while legitimate users are able to share data. Various encryption algorithms plays a very important role in providing security to the networks. Cryptography helps in enhancing the data confidentiality and privacy by making information incoherent. In this research a comparative analysis of key exchange protocols is done so as to enumerate their security level, computational time and data transmission time. This paper seeks a fair performance comparison between various Symmetric Key Encryption and Asymmetric Key Encryption Algorithms such as Diffie-Hellman Key Exchange, RSA, ECC.

Keywords: Cryptography, Encryption, Symmetric Key Encryption and Asymmetric Key Encryption, Diffie- Hellman, RSA, ECC, Public-Key Cryptosystem

View PDF

Refund policy | Privacy policy | Copyright Information | Contact Us | Feedback © Publishingindia.com, All rights reserved