International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 6 - Issue 7, July 2017 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

A Review Of Encryption Algorithms-RSA And Diffie-Hellman

[Full Text]



Nilesh A. Lal



Cryptography, Diffie Hellman, Network Security, Public key, Private key, RSA, Symmetric



Network security is protecting data and message from cybercrime. Cryptography system is designed freely to communicate over a computer network. It is a process where sender sends encrypted message to the recipient. Symmetric encryption is known as the single key encryption. RSA algorithm is a symmetric key encryption.it uses public key and private key. Diffie Hellman cryptography is where both parties exchange secrets keys to encrypt message.



[1]. I. Wikimedia Foundation, "Network Security," 2017. [Online]. Available: https://en.wikipedia.org/wiki/Network_security. [Accessed 14 03 2017].

[2]. K. H. Rosen, Cryptography Theory and Practice, 3rd ed., University of Waterloo.

[3]. "Cryptography Benefits & Drawbacks," [Online]. Available: https://www.tutorialspoint.com/cryptography/benefits_and_drawbacks.htm. [Accessed 23 03 2017].

[4]. W. Stallings, Network Security Essentials, 4th ed., New York: Pearson Education, Inc, 2011.

[5]. "Symmetric vs. Asymmetric Encryption What are differences?," [Online]. Available: https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences. [Accessed 23 03 2017].

[6]. "Description of Symmetric and Asymmetric Encryption," 2007. [Online]. Available: https://support.microsoft.com/en-us/help/246071/description-of-symmetric-and-asymmetric-encryption. [Accessed 23 03 2017].

[7]. M. Higashi, "SYMMETRIC VS ASYMMETRIC ENCRYPTION," 2013. [Online]. Available: https://www.ciphercloud.com/blog/cloud-information-protection-symmetric-vs-asymmetric-encryption/. [Accessed 24 03 2017].

[8]. R. G. Anjali Patil, "A Comparative Survey Of Symmetric Encryption," INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, vol. 2, no. 8, p. 62, 2013.

[9]. A. H. A. Hadi, "A Survey On Some Encryption Algorithms And," INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, vol. 2, no. 12, p. 286, 2013.

[10]. S. Blanda, "RSA Encryption Keeping the Internet Secure," 2014. [Online]. Available: http://blogs.ams.org/mathgradblog/2014/03/30/rsa/. [Accessed 24 03 2017].

[11]. F. H. a. F. R. Michael Cobb, "RSA algorithm (Rivest-Shamir-Adleman)," 2014. [Online]. Available: http://searchsecurity.techtarget.com/definition/RSA. [Accessed 24 03 2017].

[12]. H. M. J. Ali Makhmali, "Comparative Study On Encryption Algorithms," INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, vol. 2, no. 6, p. 44, 2013.
[13]. D. Chauhan, "RSA and Diffie-Hellman Algrithm," 2016. [Online]. Available: https://www.slideshare.net/daxeshchauhan/rsa-and-diffie-hellman-algorithms-64170629. [Accessed 24 03 2017].

[14]. E. E. Classes, "Diffie Hellman Key Exchange in Hindi for Symmetric Key Encryption System With Example," 2016. [Online]. Available: https://www.youtube.com/watch?v=_M2Ea_3DRGA. [Accessed 24 03 2017].

[15]. K.Suganya, "Performance study on Diffie Hellman," INTERNATIONAL JOURNA L FOR RES EARCH IN AP PL I ED SC IENC E, vol. 2, no. 3, pp. 68-75, 2014.