Symmetric versus Asymmetric Cryptographic Techniques and Security Issues under Various Applications

Blerina Çeliku, Rafail Prodani, Klajdi Qafzezi


There are so many different scenarios and applications over the Internet when we send or receive sensitive data and it is crucial to protect that data from unauthorized users. Cryptography and encryption are very common in altering data in a secret manner, encrypting communication or using certificates about websites. In this era, the security for the data has become highly important since the communication by transmitting of digital products over the open network occur very frequently. The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. Performance and implementation cost are crucial concerns dealing with cryptographic algorithms used in several practical applications. Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. Many encryption algorithms are widely available and used in information security. They have changed a lot form the basic ciphers to modern algorithms and it is known that specific algorithms are best suited in specific cases. Symmetric or asymmetric, encryption techniques are used frequently and are very common but there some features that dictate their use. In this paper, we study these categories and compare completely the most common cryptographic algorithms in use nowadays.


Symmetric, asymmetric, encryption, performance, security.

Full Text:



E. Surya, C.Diviya “A Survey on Symmetric Key Encryption Algorithms”, International Journal of Computer Science & Communication Networks, Volume 2(4), 475-477 475 ISSN: 2249-5789

D. Salama, A. Elminaam and etal, "Evaluating the Performance of Symmetric Encryption Algorithms", International Journal of Network Security, Vo1.10, No.3, PP.216-222, May2010.

Ruangchaijatupon, P. Krishnamurthy, ''Encryption and Power Consumption in Wireless LANs-N, ’’ The Third IEEE Workshop on Wireless LANs- September 27-28, 2001- Newton, Massachusetts.

W. Diffie, M. Hellman, “Exhaustive cryptanalysis of the NBS data encryption standard,” Computer, p.74-78, June 1977.

Monika Agrawal, Pradeep Mishra,”A Comparative Survey on Symmetric Key Encryption Techniques”, International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, PP877-882.

“Introduction to cryptography”

B. Schneier, "The blowfish encryption algorithm-one year later," Dr. Dobb’s Journal, 1995.

RSA algorithm,

R. Chandramouli, S. Bapatla, and K. P. Subbalakshmi, “Battery Power-Aware Encryption”, ACM Transactions on Information and System Security, Vol. 9, No. 2, May 2006, Pages 162–180.

“Superiority of Blowfish Algorithm”, by Pratap, International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X.

Challa Narasimham, Jayaram Pradhan,” Evaluation Of Performance Characteristics Of Cryptosystem Using Text Files” Journal of Theoretical and Applied Information Technology, pp. 55-59 2008.

Aamer Nadeem, Dr M. Younus Javed, “A Performance Comparison of Data Encryption Algorithms”,, September 2005.

Marwa Abd El-Wahed, Saleh Mesbah, and Amin Shoukry,” Efficiency and Security of Some Image Encryption Algorithms”, Proceedings of the World Congress on Engineering 2008 Vol. I WCE 2008, July 2 - 4, 2008, London, U.K.

RSA Factoring Challenge,

Common Cryptography Operations,


  • There are currently no refbacks.

Creative Commons License 
This work is licensed under a Creative Commons Attribution 3.0 License. 

Copyright © 2016 by Global Publishing Corporation

ISSN: 2394-501X

For any Technical Support contact us at