Archives

A Scholarly Audit on the Traits of Enciphering, Deciphering Algorithms bifurcated under Symmetric, Assymetric for Wired cum Wireless Environment


R.Julian Menezes, Dr.P.Jesu Jeyarin and J.Albert Mayan
Abstract

Denial of Access to an entity, that which is not authorized to access a digital Information, can be achieved by concealment of that particular information at hand". "A procedure for clambering Digital Infos in order, for the required node to grab the meaning from the clambered Info". The afore mentioned statements when magnified in terms of a Computing Jargon, can rightly be defined as Encryption. Our present Era is an epoch of digital Infos which are at constant flight in air waves all around us. Therefore we are at a point in time to barricade our Infos which are occupying the magnetic bubbles inside a metallic box termed as HDD, which in turn is embedded within our Handhelds, Tabs, Laps, Gaming Consoles, DVR, Desktops...and so on, against espionages, Reverse Engineering, Evil Twin, Routersploits, Metasploitable, Exploit Embedding Intrusions which are prevalent in the Inter Network of Computers. There exists variant methodologies which can be swung in for barricading the Digital Infos, with relevance to the aforementioned statements which in Greek "Krypto"+"Graphikos" stands for Cryptography. Corroborating a Digital Info leads to the term Encryption. While choosing the apt pupil "n" number of entities is taken into account being the CGPA as the last yardstick to measure his/her intelligence. Likewise for barricading our digital entities we need to consider several factors on par with choosing an Algorithm which is doing a fabulous job in terms of Encryption. Fundamentally the Algorithm which is under our radar gets inducted based only on the key stone requirement of an App. The key essentiality of a specific App may include the following like Time Length for the Application to interact with the End-User, Capacity for Transmission from source node to destination Node, Surreptitiousness, and last but not the least Rectitude. Nonetheless one or the other Algorithms have their own pros and cons. We are going to discuss theaftermath of the exertion and scrutiny that got enforced on Algorithms taken under study for this Literary Review. The Algorithms that are kept under our radar for review are well known and utilized day in and day out and are bifurcated under Symmetric (same key for ciphering and deciphering), Assymetric (Different Keys for Ciphering and Deciphering), commencing with Blowfish, Advanced Encryption Standards, Triple Data Encryption Standards, Data Encryption Standards, Rivest Shamir Adleman, Diffie-Hellman, Elliptic Curve Cryptography, Elliptic Curve Diffie-Hellman, ElGamal Encryption Algorithm, Knapsack Algorithm, Digital Signature Algorithm and Short Range Natural Numbers. Furthermore we are impelling to unfold the juxtaposition amidst the ancestral crafty specifications of entities like attainment, vulnerability, and lastly tenacity. Inthis Literary Audit, inspections of variantAlgorithms falling under the categorization of Encryption are getting showcased.

Volume 11 | 01-Special Issue

Pages: 1443-1454