Comparative Analysis of Key Exchange Algorithms in Cryptography and its Implementation
Published: 2013
Author(s) Name: Aakanksha Chopra |
Author(s) Affiliation: Asst. Prof. (IT), Jagan Inst. of Mgt. Studies (JIMS), New Delhi, India.
Locked
Subscribed
Available for All
Abstract
Internet today which is the main source of information access is becoming intricate to supervise and manage. Protection of network these days is becoming a very serious facet when the degree of data to be shared is large and complex. The critical concern today is that how the secure data communication over the network can be maintained and also how can data be protected so that it is not disclosed
to illegitimate users while legitimate users are able to share data. Various encryption algorithms plays a very important role in providing security to the networks. Cryptography helps in enhancing the data confidentiality and privacy by making information incoherent. In this research a comparative analysis of key exchange protocols is done so as to enumerate their security level, computational time and data transmission time. This paper seeks a fair performance comparison between various Symmetric Key Encryption and Asymmetric Key Encryption Algorithms such as Diffie-Hellman Key Exchange, RSA, ECC.
Keywords: Cryptography, Encryption, Symmetric Key Encryption and Asymmetric Key Encryption, Diffie- Hellman, RSA, ECC, Public-Key Cryptosystem
View PDF