The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A Comparative Study on Symmetric and Asymmetric Key Encryption Techniques
Abstract
With the rise in use of internet in various fields like education, military, government sector, banking, the security and privacy of the info has been the foremost concern. As in today's era, most of the handling of data and transactions are done online. When the data is transferred from the one end of sender to the other end of receiver online, it's eavesdropped by an intruder and thus could be a threat to the secrecy or confidentiality of the info. The hottest technique that protects the confidentiality of the data is cryptography which converts the plain text into scrambled form which is unreadable. Then the receiver applies a reverse mechanism to decrypt the unreadable data to readable form. This mechanism is known as encryption-decryption process or cryptography. Cryptography can be both symmetric and asymmetric. Here the authors discuss symmetric and asymmetric algorithms.
Related Content
Tushar, Nandita Pradhan, Pooja Jaiswal.
© 2025.
54 pages.
|
Sarthak Bisht, Tia Mittal, Karan Bhambhani, T. Y. J. Naga Malleswari.
© 2025.
16 pages.
|
Anup Raju Vasistha, Chandramouli H. Mahadevaswamy, Solomon H. Ebenuwa, Augustine O. Nwajana.
© 2025.
16 pages.
|
Smrity Dwivedi.
© 2025.
28 pages.
|
W. Aldrin Joan Pandian, Palak Mangal, D. Lakshmi, I. Jasmine Selvakumari Jeya.
© 2025.
40 pages.
|
Moyinoluwalogo Mayowa, Richard I. Otuka, Nemitari Ajienka, Augustine O. Nwajana.
© 2025.
52 pages.
|
Rahul Koshti.
© 2025.
24 pages.
|
|
|