Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Symmetric and Asymmetric Encryption Algorithms, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Encryption algorithms are very important to many applications, both in computer science as well as in other fields. For an application designer, understanding the different types of encryption algorithms and different encryption algorithms is very important. The biggest distinction within encryption algorithms is whether or not an algorithm is symmetric. Symmetric algorithms, such as AES, use the same private key (also called the secret key) at both the sending and receiving sides. On the other hand, asymmetric algorithms (usually known as public key cryptography) such as ECC and RSA use a public key and private key; the private key is only known the receiver, while everyone has access to the public key. The public key is used to encrypt a message and the private key, only held by the owner, is used to decrypt the message. The design of asymmetric algorithms do not allow anyone with a public key to decrypt other messages. In this paper, we shall examine 3 encryption algorithms: AES (the Advanced Encryption Standard, a symmetric algorithm), ECC (Elliptic Curve Cryptographic, an asymmetric algorithm), and RSA (name after its discoverers, Ron Rivest, Adi Shamir and Leonard Adleman, an asymmetric algorithm).
AES, or the Advanced Encryption Standard, is a popular symmetric encryption algorithm. AES was designed to supersede the now obsolete DES (Data Encryption Standard). AES is based on the Rijndael cipher (named after its 2 designers, Vincent Rijmen and Joan Daemen). AES allows for key sizes of 128, 192, or 256 bits and uses 128 bit blocks. The number of rounds are based on the key size. For 128-bit keys, 10 rounds are used. For 192-bit keys, 12 rounds are used, and for 256-bit keys, 14 rounds are used. The AES algorithm ses 4 steps. First, a step called “KeyExpansion” uses Rijndael’s key schedule to derive the round keys from the cipher key. Next, the “InitialRound” occurs, using the AddRoundKey operation, where each byte of the state is operated on by a bitwise xor with the round key. Next, the rounds begin, in the order of SubBytes (a non-linear substitution that replaces all bytes with another using a constant table), ShiftRows (where each row is shifted left cyclically a number of times based on how many preceding rows), MixColumns (each column of the state is multiplied by a constant invertible matrix), and finally AddRoundKey. These four steps are repeated for each round. The final step consists of 3 steps: SubBytes, ShiftRows, and AddRoundKey. All known attacks on AES are currently computationally infeasible. For 128-bit AES, the best attack has a computation complexity of . For 192-bit and 256-bit AES, the best attacks have computation complexities if and , respectively.
Next, we discuss RSA. RSA is the most popular algorithm in practice, and it is usually combined with AES in SSL/TLS. The security of RSA is based on the difficulty of factoring extremely large semi-prime numbers. RSA allows for any key size technically, but use of powers of 2 is conventional in computer science. The minimum recommended size is 1024-bits, and the largest in practical use is 4096-bit, but RSA keys may be larger or smaller. RSA only uses 1 round. The largest RSA key to be broken yet is a 768-bit key. There are no known attacks on a well-implemented RSA toolkit.
Finally, we discuss ECC, or elliptic curve cryptography. The advantage of ECC is that ECC is much more secure than RSA of the same key size; a 256-bit ECC key is approximately equivalent to a 3072-bit RSA key. ECC is based on the equation . The variables a and b are part of the public key. The security of ECC is based on the difficulty of computing the discrete logarithm of an elliptic curve with respect to a known base point. Theoretically, elliptic curve cryptography has a computation complexity of , where n is the key size.
Works Cited
Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203–209.
RSA Laboratories. (2003, January). What is the AES? Retrieved from RSA: http://www.rsa.com/rsalabs/node.asp?id=2235
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee