A Comparative Study on Symmetric and Asymmetric Key Encryption Techniques
With the rise in use of internet in various fields like education, military, government sector, banking, the security and privacy of the info has been the foremost concern. As in today's era, most of the handling of data and transactions are done online. When the data is transferred from the one end of sender to the other end of receiver online, it's eavesdropped by an intruder and thus could be a threat to the secrecy or confidentiality of the info. The hottest technique that protects the confidentiality of the data is cryptography which converts the plain text into scrambled form which is unreadable. Then the receiver applies a reverse mechanism to decrypt the unreadable data to readable form. This mechanism is known as encryption-decryption process or cryptography. Cryptography can be both symmetric and asymmetric. Here the authors discuss symmetric and asymmetric algorithms.