Comparison of Time Complexity of Symmetric and Asymmetric Key Cryptographic Algorithms

Authors

  • Dr. J P Patra  Professor, Department of Computer Science & Engineering SSIPMT, CSVTU, Raipur, Chhattisgarh, India
  • Bhumika Joshi  Computer Science & Engg.SSIPMT, Raipur, Chhattisgarh, India
  • Snigdha Chowdhury  Computer Science & Engg.SSIPMT, Raipur, Chhattisgarh, India

Keywords:

Cryptography, Symmetric Key, Asymmetric Key, Advanced Encryption Standard (AES), Rivest-Shamir-Adleman (RSA).

Abstract

Information security is the most important as well as the most challenging aspect when considered for internet and network applications. Since internet and network applications are growing very fast so it has become very important to provide necessary protection to the data against the attackers and that too in time. The intruders may use the data being sent for fraudulent purposes. So in order to reduce data loss and pilfering, data privacy requires more attention. Cryptography is one of the popular means of protecting information in order to achieve confidentiality, integrity, authentication, non-repudiation, access control and availability. Cryptography is a main aspect of computer security that converts data from its actual form into an unreadable form. The two main characteristics that identify and differentiate one algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. The two widely accepted and used categories of cryptographic algorithms to protect information using the desired key are symmetric and asymmetric. Asymmetric algorithms have been analyzed by researchers to be stronger compared to Symmetric algorithms but has higher time complexity. AES belongs to the category of symmetric key cryptography and RSA belongs to the category of asymmetric key cryptography. This paper comprises of brief description of AES and RSA cryptographic algorithms. Also a theoretical as well as a practical performance analysis and comparison of symmetric and asymmetric cryptography has been provided. The comparison is made on the basis of speed, key size and time complexity. A website has been developed using Bootstrap and PHP to execute the codes.

References

  1. Prof. R.M.Sahu, Akshay Godase, Pramod CONTROL ENGINEERING, Vol. 4.
  2. Kanchan Mahajan, Proff.J.S.Chitode, "Waste Bin Monitoring

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. J P Patra, Bhumika Joshi, Snigdha Chowdhury, " Comparison of Time Complexity of Symmetric and Asymmetric Key Cryptographic Algorithms, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.162-166, March-April-2018.