ISSN 2394-5125
 


    Design and Analysis of a Secure Hardware Implementation for Cryptography Applications (2020)


    CHETAN PANDEY
    JCR. 2020: 3935-3942

    Abstract

    Networks need to communicate securely to ensure that data is kept safe from unauthorized access or malicious attacks. Cryptography algorithms play a key role in achieving this goal. Symmetric key algorithms use a single key to both encrypt and decrypt data, making them fast and efficient. However, the main challenge with symmetric key algorithms is key management, as the same key needs to be securely shared among all parties involved in the communication. On the other hand, asymmetric key algorithms use a pair of keys (a public key and a private key) to encrypt and decrypt data. The public key can be freely shared, while the private key must be kept secret. Asymmetric key algorithms are slower than symmetric key algorithms, but they offer a higher level of security. AES (Advanced Encryption Standard) is a symmetric key algorithm widely used for data encryption. It is considered to be very secure and is used by many organizations to protect sensitive data. RSA (Rivest�Shamir�Adleman) is an asymmetric key algorithm often used for key exchange and digital signatures. It is also considered to be secure, although it can be slower than other asymmetric key algorithms. By combining features of both symmetric and asymmetric key algorithms, it is possible to create a new security protocol that offers better security than using a single algorithm alone. The new protocol can leverage the speed and efficiency of symmetric key algorithms, while also benefiting from the increased security provided by asymmetric key algorithms. The main purpose of designing this new algorithm is to provide better security to data in transit against passive as well as active attacks. Passive attacks involve eavesdropping on the communication to gain access to sensitive data, while active attacks involve attempting to modify or disrupt the communication. By using a more secure protocol, organizations can protect their data from both types of attacks and ensure that it remains confidential, authentic, and available.

    Description

    » PDF

    Volume & Issue

    Volume 7 Issue-8

    Keywords