CFP last date
20 December 2024
Reseach Article

A Review on Symmetric Key Encryption Techniques in Cryptography

by Mohammad Ubaidullah Bokhari, Qahtan Makki Shallal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 10
Year of Publication: 2016
Authors: Mohammad Ubaidullah Bokhari, Qahtan Makki Shallal
10.5120/ijca2016911203

Mohammad Ubaidullah Bokhari, Qahtan Makki Shallal . A Review on Symmetric Key Encryption Techniques in Cryptography. International Journal of Computer Applications. 147, 10 ( Aug 2016), 43-48. DOI=10.5120/ijca2016911203

@article{ 10.5120/ijca2016911203,
author = { Mohammad Ubaidullah Bokhari, Qahtan Makki Shallal },
title = { A Review on Symmetric Key Encryption Techniques in Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 10 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 43-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number10/25692-2016911203/ },
doi = { 10.5120/ijca2016911203 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:51:36.001105+05:30
%A Mohammad Ubaidullah Bokhari
%A Qahtan Makki Shallal
%T A Review on Symmetric Key Encryption Techniques in Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 10
%P 43-48
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the era of digital communication, the information sharing is rapidly increased. All the data which being sent or received are vulnerable to many active and passive attacks. Therefore, secure the data during communication is the most important concern. Cryptography performs an essential role to secure the communication in network and it comes with an amazing solution to supply the needed protection against the intruders of data. Over a considerable time, the techniques of data encryption took a huge leap from very easy methods to very difficult mathematical calculations in an effort to generate a strong security for the communication. However still along with its difficulty, the algorithms of cryptographic are prone to many attacks. this paper is explains many techniques of symmetric key encryption, its comparison and their vulnerabilities to attacks.

References
  1. Stallings, William. Network security essentials: applications and standards. Pearson Education India, 2007.
  2. K. Saranya, R. Mohanapriya, and J. Udhayan, “A Review on Symmetric Key Encryption Techniques in Cryptography,” Int. J. Sci. Eng. Technol., vol. 3, no. 3, pp. 539–544, 2014.
  3. Kahate, Atul. Cryptography and network security. Tata McGraw-Hill Education, 2013.
  4. B. Schneier, “Applied Cryptography,” Electr. Eng., vol. 1, no. [32, pp. 429–455, 1996.
  5. Gulzar, Nikki, et al. "Surveillance Privacy Protection." Intelligent Multimedia Surveillance. Springer Berlin Heidelberg, 2013. 83-105.
  6. Wang, Cong, et al. "Toward secure and dependable storage services in cloud computing." Services Computing, IEEE Transactions on 5.2 (2012): 220-232.
  7. Zager, Robert P., et al. "Rapid identification of message authentication." U.S. Patent Application No. 14/556,332.
  8. M. Agrawal and P. Mishra, “A comparative survey on symmetric key encryption techniques,” Intern. J. Comput. Sci. Eng., vol. 4, no. 5, pp. 877–882, 2012.
  9. Kahate, Atul. Cryptography and network security. Tata McGraw-Hill Education, 2013.
  10. Beaulieu, Ray, et al. "The SIMON and SPECK lightweight block ciphers."Proceedings of the 52nd Annual Design Automation Conference. ACM, 2015.
  11. Komninos, Nikos. "MORPHEUS: AWORD-ORIENTED STREAM CIPHER."International Journal of Computer Research 19.2/3 (2012): 220.
  12. Cao, Ning, et al. "Privacy-preserving multi-keyword ranked search over encrypted cloud data." Parallel and Distributed Systems, IEEE Transactions on 25.1 (2014): 222-233.
  13. Stallings, William. Cryptography and Network Security, 4/E. Pearson Education India, 2006.
  14. Schneier, Bruce. Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007.
  15. Conti, Greg. Security data visualization: graphical techniques for network analysis. No Starch Press, 2007.
  16. Kahate, Atul. Cryptography and network security. Tata McGraw-Hill Education, 2013.
  17. Jesudoss, A., and N. Subramaniam. "A Survey on Authentication Attacks and Countermeasures in a Distributed Environment." IJCSE, vol 5.2 (2014).
  18. Daemen, Joan, and Vincent Rijmen. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, 2013.
  19. Kahate, Atul. Cryptography and network security. Tata McGraw-Hill Education, 2013.
  20. Bellare, Mihir, Kenneth G. Paterson, and Phillip Rogaway. "Security of symmetric encryption against mass surveillance." Advances in Cryptology–CRYPTO 2014. Springer Berlin Heidelberg, 2014. 1-19.
  21. Raychev, Nikolay. "Classical cryptography in quantum context."Proceedings of the IEEE 10 (2012): 2015.
  22. Rebeiro, Chester, Debdeep Mukhopadhyay, and Sarani Bhattacharya. "Modern cryptography." Timing Channels in Cryptography. Springer International Publishing, 2015. 13-35.
  23. Saranya, K., R. Mohanapriya, and J. Udhayan. "A Review on Symmetric Key Encryption Techniques in Cryptography." International Journal of Science, Engineering and Technology Research 3.3 (2014): 539-544.
  24. Huang, Yitong. Comparing the Efficiency of Hybrid and Public Key Encryption Schemes. Diss. 2015.
  25. Salomaa, Arto. Public-key cryptography. Springer Science & Business Media, 2013.
  26. Kong, Jia Hao, Li-Minn Ang, and Kah Phooi Seng. "A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments." Journal of Network and Computer Applications 49 (2015): 15-50.
  27. Agrawal, Monika, and Pradeep Mishra. "A comparative survey on symmetric key encryption techniques." International Journal on Computer Science and Engineering 4.5 (2012): 877.
  28. Iqbal, Md Sarfaraz, Shivendra Singh, and Arunima Jaiswal. "Symmetric Key Cryptography: Technological Developments in the Field." International Journal of Computer Applications 117.15 (2015).
Index Terms

Computer Science
Information Sciences

Keywords

Cryptographic cryptographic goals Classical cryptographic modern cryptographic