In modern era, it should be noted that all work
related to banking, ATM card, credit card, marketing, Ecommerce
etc are done on internet. So there must be security
provided over the network. In this paper we survey the
researches held on various encryption methods used in
cryptography and attacks such as factorization problem, low
decryption exponent, common modulus, short message, cyclic
attack and side channel attack etc. This paper presents the
theoretical aspects and comparative study about different
encryption techniques in cryptosystem.
Ritu Patidar : Assistant Professor, Department of Computer Science,
RGPV University, SVITS,
Indore, India
Rupali Dave : Assistant Professor, Department of Computer Science,
RGPV University, SVITS,
Indore, India
Anubha Sharma : Assistant Professor, Department of Computer Science,
RGPV University, SVITS,
Indore, India
RSA algorithm
encryption
decryption
public key
private key
prime number theorem(PNT)
C4
Greatest
Common Divisor(GCD)
In this paper comparative study of different encryption
algorithms are presented. With theoretical aspects it was
concluded that the advanced encryption standard, RSA
public cryptography is more efficient than the Data
encryption standard. AES can be used when high security
is needed. This paper presents the theoretical analysis of
selected symmetric algorithms. These selected algorithms
are AES, DES, Blowfish, IDEA and RSA. All encryption
techniques are discussed and analyzed the working
performance of the encryption methods. This paper
presents survey on the existing works of the encryption
techniques and also presents various attacks in
cryptosystem. Each technique of encryption is different in
working, which might be suitable for different
applications. All the techniques are useful for real-time
encryption.
[1] Mandeep kaur and Manish Mahajan “Using encryption
Algorithms to enhance the Data Security in Cloud
Computing”, International Journal of Communication
and Computer Technologies Vol.01 – No.12, Issue.03,
January 2013.
[2] Prof.Dr. Alaa Hussein Hamamiand, Ibrahem Abdallah
Aldariseh, “Enhanced Method for RSA Cryptosystem
Algorithm”, International Conference on Advanced
Computer Science Applications and Technologies,
pp.402-408, Nov 2012.
[3] XinZhou and Xiaofei Tang “Research and
Implementation of RSA Algorithm for Encryption and
Decryption”, The 6th International Forum on Strategic
Technology, Vol.2, pp.1118-1121, Aug 2011.
[4] Sami A. Nagar and Saad Alshamma “High Speed
Implementation of RSA Algorithm with Modified
Keys Exchange”, 6th International Conference on
Sciences of Electronics, Technologies of Information
and Telecommunications (SETIT), pp.639-642, March
2012.
[5] R. Rivest, A. Shamir, and L. Adleman, "A Method for
Obtaining Digital Signatures and Public-Key
Cryptosystems," Vol. 21, pp.120-126, 1978.
[6] W. Stallings “Cryptography and network security”, vol.
2 prentice hall, 2003.
[7] Ravi Shankar Dhakar and Amit Kumar Gupta
“Modified RSA Encryption Algorithm (MREA)”,
Second International Conference on Advanced
Computing & Communication Technologies, pp.426-
429, Jan 2012.
[8] B.Persis Urbana Ivy, Purshotam Mandiwa. Mukesh
Kumar “A modified RSA cryptosystem based on ‘n’
prime numbers”, International Journal Of Engineering
And Computer Science, Vol.1, pp. 63-66, 2 Nov 2012.
[9] Shilpi Gupta and Jaya Sharma “A hybrid encryption
algorithm based on RSA and diffie hellman”, IEEE
International Conference on Computational
Intelligence and Computing Research, pp.1-4, Dec
2012.
[10] Wuling Ren and Zhiqian Miao, “A hybrid encryption
algorithm based on DES and RSA in Bluetooth
communication”, Second International Conference On
Modeling, Simulation and Visualization Methods, pp.
221-225, May 2010.
[11] [1] William Stallings “ Network Security Essentials
(Applications and Standards)”, Pearson Education,
2004.