The Importance Of Symmetric Cryptography

1765 Words4 Pages

Symmetric cryptography, also known as secret key cryptography, has been in use for thousands of years in forms ranging from simple substitution ciphers(figures) to more complex developments. Be that as it may, improvements in science and the development of computing power have made it possible to make ciphers(figures) that are effectively unbreakable and secured. Symmetric frameworks are for the most part quick however are powerless so the key used to encrypt must be imparted to whomever needs to decrypt the message. The IBM-created figure DES has been generally utilized yet is presently toward the finish of its helpful life and is expected for substitution. Whatever figure designers use in their applications, it's vital to consider the …show more content…

One of the qualities of the symmetric cryptography is that it has a tendency to be more successful since there is no time delay which is experienced about the encryption and decryption of information (Minaam, Abdual-Kader & Hadhoud, 2010). What's more, the symmetric cryptography always realizes the part of validation because any data encrypted utilizing a single symmetric key cannot be decoded utilizing another kind of symmetric key. In addition, the symmetric cryptography can be more effective when the symmetric key is secret in the encryption of the communication. 2. The second nature of the symmetric cryptography is that trusting members can exchange the symmetric key. For example, for each match of members, a phenomenal key is for the most part Symmetric Cryptography delivered. In this way, the members are always ensured that each one of the messages encoded using a symmetric key, it is only the related part who can decode the message (Anand, Bajpai and Bhaskar, 2009). Regardless, the symmetric key should be kept the way to avoid unapproved people from getting to …show more content…

Stream Cipher – This process is implemented when the amount of data to be ciphered is unknown/ not fixed, ex messaging. Here the encryption is done bit by bit. Here the plain text uses a portion of the key that has same length as the plain text. Some of the popular Stream ciphers are -
A. RC4 – Rivest Cipher 4, also known as ARC Four was designed by Ron Rivest in 1987 for RSA. Several known encryptions like WEP, SSL, TLS and WPA make use of RC4 in their encryption process. It is susceptible to Roose bias, distinguishing attacks, Fluher-Mantin-Shamir attack, Klien’s and several other attacks.
B. A5/1 - It was created in 1987 is used to encrypt over the air communication and is hence defined for GSM use, serving over 7 billion people. The original cipher was meant to have a key length of 128 but due to negotiations between the British and the Germans involved in it the length was reduced to 56, reducing its security considerably. Its algorithm was reverse engineered in 1999 and has been subject to various attacks and in recent times the decryption can also be done in real-time, which means the security is very

Open Document