<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 14 Issue 2</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>March - April 2026</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2026</Year>
        <Month>03</Month>
        <Day>30</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>Comparative Analysis of Symmetric and Asymmetric Cryptographic Methods for Resource-Limited Devices</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>45</FirstPage>
      <LastPage>51</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Veeresha M M</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
                      <FirstName>Vinay S </FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
           
        </Author>
      </AuthorList>
      <DOI>https://doi.org/10.55524/ijircst.2026.14.2.6</DOI>
      <Abstract>Currently, the continuous growth of resource-constrained devices used for protecting sensitive information poses a significant challenge. Now a day cryptography plays a vital role. It helps to maintain data privacy, confidentiality, integrity, and authenticity, and also protects data during transmission.&amp;nbsp; In this study, we performed a comparative analysis of Symmetric and Asymmetric algorithms. In particular, the goal is to determine which method is suitable for resource-constrained devices such as Internet of Things(IOT) mobile phones and embedded devices.&amp;nbsp; This study clearly explained symmetric algorithms such as the Advanced Encryption standard(AES), chacha20, and Blowfish and also Asymmetric algorithms such as Rivest&amp;ndash;Shamir Adlemen(RSA), Diffie-Hellman, ElGamal, and elliptic curve cryptography(ECC). These algorithms are explained based on computational efficiency, Memory Usage, security length, and suitability for devices with limited resources. It concludes that symmetric cryptographic methods have a high speed and low computational overhead and are therefore suitable for encrypting large volumes of data. On the other hand, asymmetric methods offer a strong platform for ensuring the security of data during transmission. It concludes that the use of both symmetric and asymmetric cryptographic methods can efficiently enable secure communication in modern and resource-constrained computing environments.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Cryptographic Algorithms, Performance and Security Analysis, Symmetric and Asymmetric Encryption, Secure Data Transmission.</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=1453</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>