A Survey on Various Encryption Cryptographic Techniques  
  Authors : Ritu Patidar; Rupali Dave; Anubha Sharma

 

In modern era, it should be noted that all work related to banking, ATM card, credit card, marketing, Ecommerce etc are done on internet. So there must be security provided over the network. In this paper we survey the researches held on various encryption methods used in cryptography and attacks such as factorization problem, low decryption exponent, common modulus, short message, cyclic attack and side channel attack etc. This paper presents the theoretical aspects and comparative study about different encryption techniques in cryptosystem.

 

Published In : IJCAT Journal Volume 3, Issue 2

Date of Publication : February 2016

Pages : 96 - 101

Figures :01

Tables : 01

Publication Link :A Survey on Various Encryption Cryptographic Techniques

 

 

 

Ritu Patidar : Assistant Professor, Department of Computer Science, RGPV University, SVITS, Indore, India

Rupali Dave : Assistant Professor, Department of Computer Science, RGPV University, SVITS, Indore, India

Anubha Sharma : Assistant Professor, Department of Computer Science, RGPV University, SVITS, Indore, India

 

 

 

 

 

 

 

RSA algorithm

encryption

decryption

public key

private key

prime number theorem(PNT)

C4

Greatest Common Divisor(GCD)

In this paper comparative study of different encryption algorithms are presented. With theoretical aspects it was concluded that the advanced encryption standard, RSA public cryptography is more efficient than the Data encryption standard. AES can be used when high security is needed. This paper presents the theoretical analysis of selected symmetric algorithms. These selected algorithms are AES, DES, Blowfish, IDEA and RSA. All encryption techniques are discussed and analyzed the working performance of the encryption methods. This paper presents survey on the existing works of the encryption techniques and also presents various attacks in cryptosystem. Each technique of encryption is different in working, which might be suitable for different applications. All the techniques are useful for real-time encryption.

 

 

 

 

 

 

 

 

 

[1] Mandeep kaur and Manish Mahajan “Using encryption Algorithms to enhance the Data Security in Cloud Computing”, International Journal of Communication and Computer Technologies Vol.01 – No.12, Issue.03, January 2013. [2] Prof.Dr. Alaa Hussein Hamamiand, Ibrahem Abdallah Aldariseh, “Enhanced Method for RSA Cryptosystem Algorithm”, International Conference on Advanced Computer Science Applications and Technologies, pp.402-408, Nov 2012. [3] XinZhou and Xiaofei Tang “Research and Implementation of RSA Algorithm for Encryption and Decryption”, The 6th International Forum on Strategic Technology, Vol.2, pp.1118-1121, Aug 2011. [4] Sami A. Nagar and Saad Alshamma “High Speed Implementation of RSA Algorithm with Modified Keys Exchange”, 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp.639-642, March 2012. [5] R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Vol. 21, pp.120-126, 1978. [6] W. Stallings “Cryptography and network security”, vol. 2 prentice hall, 2003. [7] Ravi Shankar Dhakar and Amit Kumar Gupta “Modified RSA Encryption Algorithm (MREA)”, Second International Conference on Advanced Computing & Communication Technologies, pp.426- 429, Jan 2012. [8] B.Persis Urbana Ivy, Purshotam Mandiwa. Mukesh Kumar “A modified RSA cryptosystem based on ‘n’ prime numbers”, International Journal Of Engineering And Computer Science, Vol.1, pp. 63-66, 2 Nov 2012. [9] Shilpi Gupta and Jaya Sharma “A hybrid encryption algorithm based on RSA and diffie hellman”, IEEE International Conference on Computational Intelligence and Computing Research, pp.1-4, Dec 2012. [10] Wuling Ren and Zhiqian Miao, “A hybrid encryption algorithm based on DES and RSA in Bluetooth communication”, Second International Conference On Modeling, Simulation and Visualization Methods, pp. 221-225, May 2010. [11] [1] William Stallings “ Network Security Essentials (Applications and Standards)”, Pearson Education, 2004.