| 1 | Title of the Article | Comparative Analysis of Symmetric and Asymmetric Cryptographic Methods for Resource-Limited Devices |
| 2 | Author's name | Veeresha M M: Research Scholar, Department of Studies in Computer Science, Davanagere University, Davanagere, India |
| 3 | Author's name | Vinay S |
| 4 | Subject | Computer Science |
| 5 | Keyword(s) | Cryptographic Algorithms, Performance and Security Analysis, Symmetric and Asymmetric Encryption, Secure Data Transmission. |
| 6 | Abstract | Currently, the continuous growth of resource-constrained devices used for protecting sensitive information poses a significant challenge. Now a day cryptography plays a vital role. It helps to maintain data privacy, confidentiality, integrity, and authenticity, and also protects data during transmission. In this study, we performed a comparative analysis of Symmetric and Asymmetric algorithms. In particular, the goal is to determine which method is suitable for resource-constrained devices such as Internet of Things(IOT) mobile phones and embedded devices. This study clearly explained symmetric algorithms such as the Advanced Encryption standard(AES), chacha20, and Blowfish and also Asymmetric algorithms such as Rivest–Shamir Adlemen(RSA), Diffie-Hellman, ElGamal, and elliptic curve cryptography(ECC). These algorithms are explained based on computational efficiency, Memory Usage, security length, and suitability for devices with limited resources. It concludes that symmetric cryptographic methods have a high speed and low computational overhead and are therefore suitable for encrypting large volumes of data. On the other hand, asymmetric methods offer a strong platform for ensuring the security of data during transmission. It concludes that the use of both symmetric and asymmetric cryptographic methods can efficiently enable secure communication in modern and resource-constrained computing environments. |
| 7 | Publisher | Innovative Research Publication |
| 8 | Journal Name; vol., no. | International Journal of Innovative Research in Computer Science & Technology (IJIRCST); Volume-14 Issue-2 |
| 9 | Publication Date | March 2026 |
| 10 | Type | Peer-reviewed Article |
| 11 | Format | |
| 12 | Uniform Resource Identifier | https://ijircst.org/view_abstract.php?title=Comparative-Analysis-of-Symmetric-and-Asymmetric-Cryptographic-Methods-for-Resource-Limited-Devices&year=2026&vol=14&primary=QVJULTE0NTM= |
| 13 | Digital Object Identifier(DOI) | 10.55524/ijircst.2026.14.2.6 https://doi.org/10.55524/ijircst.2026.14.2.6 |
| 14 | Language | English |
| 15 | Page No | 45-51 |