Authentication and Encryption with Key Exchange are the key concepts in Cryptography, which have been continuously being targeted. Many Security Algorithms are developed as research outcome and they are broadly classified into Symmetric and Asymmetric algorithms. Symmetric Algorithms are conventional which use a common secret key that is transmitted by using physical or other communication channel. Data Encryption Standard, Triple Data Encryption Algorithm, International Data Encryption Algorithm, Blowfish and AES are the algorithms that are categorized into Symmetric. In order to make key distribution easy, Asymmetric Key algorithms such as Rivest Shamir Adleman, Diffie Hellman, Elgamal, Digital Signature Algorithm and Elliptic Curve Cryptography, are used for Encryption and Authentication where secret key remains with generating user. Rivest Shamir Adleman, ElGamal and Elliptic Curve Cryptography are the most widely used public key algorithms that perform Key Exchange and used for both authentication and confidentiality. Digital Signature Algorithm is a generally applied digital signature system where as Diffie Hellman is used only for Key Exchange. This paper presents a review of the renowned Symmetric and Asymmetric algorithms. The specified algorithms are developed and test results are presented comparing the performance and key sizes.
The concept behind the next generation wireless networks is the coexistence of different radio access networks aimed for integration of different set of technologies. In turn these networks will have various kinds of parameters like Jitter, Delay, Bandwidth, Area of Coverage and Power Consumption etc., which in turn impose new challenges on mobility management. The goal of next generation network is to give users a great flexibility to have access to desired services from different available networks on the basis of anywhere, anytime services with a principle called Always Best Connected (ABC). The contribution of this work is the design of network selection mechanism based on the user preference, network parameters with the implementation of sub layer fuzzy logic controller concept in a heterogeneous environment to select a network for desired running applications.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.