International Conference on Advancements in Engineering and Technology |
Foundation of Computer Science USA |
ICAET2015 - Number 4 |
August 2015 |
Authors: Tannu Bala, Yogesh Kumar |
a556564d-927b-4feb-bd31-e75afb5394b6 |
Tannu Bala, Yogesh Kumar . Asymmetric Algorithms and Symmetric Algorithms: A Review. International Conference on Advancements in Engineering and Technology. ICAET2015, 4 (August 2015), 1-4.
In these days securing a network is an important issue. Many techniques are provided to secure network. Cryptographic is a technique of transforming a message into such form which is unreadable, and then retransforming that message back to its original form. Cryptography works in two techniques: symmetric key also known as secret-key cryptography algorithms and asymmetric key also known as public-key cryptography algorithms. In this paper we are reviewing different symmetric and asymmetric algorithms.