Currently, the continuous growth of resource-constrained devices used for protecting sensitive information poses a significant challenge. Now a day cryptography plays a vital role. It helps to maintain data privacy, confidentiality, integrity, and authenticity, and also protects data during transmission. In this study, we performed a comparative analysis of Symmetric and Asymmetric algorithms. In particular, the goal is to determine which method is suitable for resource-constrained devices such as Internet of Things(IOT) mobile phones and embedded devices. This study clearly explained symmetric algorithms such as the Advanced Encryption standard(AES), chacha20, and Blowfish and also Asymmetric algorithms such as Rivest–Shamir Adlemen(RSA), Diffie-Hellman, ElGamal, and elliptic curve cryptography(ECC). These algorithms are explained based on computational efficiency, Memory Usage, security length, and suitability for devices with limited resources. It concludes that symmetric cryptographic methods have a high speed and low computational overhead and are therefore suitable for encrypting large volumes of data. On the other hand, asymmetric methods offer a strong platform for ensuring the security of data during transmission. It concludes that the use of both symmetric and asymmetric cryptographic methods can efficiently enable secure communication in modern and resource-constrained computing environments.
Keywords
Cryptographic Algorithms, Performance and Security Analysis, Symmetric and Asymmetric Encryption, Secure Data Transmission.