Comparative Study of Symmetric and Asymmetric Cryptography Techniques

نویسندگان

  • Ritu Tripathi
  • Sanjay Agrawal
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparative Study of Tooth Wear, Mechanical Power Losses and Efficiency in Normal and High Contact Ratio Asymmetric Spur Gears

The surface tooth wear which occurs at the gear contact region due to inadequate contact strength of the tooth is one of the predominant modes of gear failures. Currently, higher contact ratio spur gears are increasingly used in power transmission applications such as aircraft, wind turbine, automobiles and compact tracked vehicles due to their high load carrying capacity.  In this work, the di...

متن کامل

A Comprehensive and Comparative Study of Elliptic Curve Cryptography Hardware Implementations for WSN

Key management and authentication are essential modules for network security provisioning especially for Wireless Sensor Networks (WSN). Make available these two services by using symmetric cryptosystems in software implementation are challenging that’s not providing a perfect trade-off between resilience and performance. Asymmetric approaches with public key cryptosystems, specifically Ellipti...

متن کامل

Experimental Study of Discharge Coefficient of Symmetric and Asymmetric Rectangular Labyrinth Weirs

The discharge coefficient of labyrinth weirs increases with increasing the crest length in a certain width range. The present research was carried out in a laboratory flume with a length of 8 m, a width of 0.6 m, and a height of 0.6 m. The discharge coefficient of two-cycle symmetric and asymmetric rectangular labyrinth weirs was experimentally measured. The dimensional analysis by the Buckingh...

متن کامل

Performance and analysis of NTRU and Advanced NTRU cryptosystems

Authentication and Confidentiality is the main goal of the public key cryptosystems deal when communication takes place between both the parties. The mostly used cryptographic methods are broadly classified as symmetric and asymmetric. The DES comes under the category of symmetric key cryptosystem whereas RSA, NTRU[1] belongs to the category of asymmetric key cryptosystem. NTRU (Nth degree trun...

متن کامل

Error Control Codes: A Novel Solution for Secret Key Generation and Key Refreshment Problem

Cryptography is the science of encrypting the information so that it is rendered unreadable for an intruder. Cryptographic techniques are of utmost importance in today’s world as the information to be sent might be of invaluable importance to both the sender and the receiver. Various cryptographic techniques ensure that even if an intruder intercepts the sent information, he is not able to deci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014