A Review on Symmetric Key Encryption
Keywords:
Plaintext, Ciphertext, Encryption algorithm, Secret key, Decryption algorithmAbstract
Now a day, the most important thing is to maintain confidentiality and integrity of our data. Due to the large growth of digitalization, data on internet is not secure. Cryptography is the way to secure data while transmitting from one location to another. This theory includes Encryption and Decryption. Or in other words, Encipher and Decipher. There are different types of encryption techniques, like symmetric encryption and asymmetric encryption. This paper focuses on symmetric cipher model and list out different symmetric ciphers.
References
Cryptography-network-security-principles and practices by William Stallings-indianpdf.com_pdf.
Bellare, Mihir, Kenneth G. Paterson, and Phillip Rogaway. “Security of symmetric encryption against mass surveillance.” Advances in Cryptology CRYPTO 2014. Springer Berlin Heidelberg, 2014 1-19.
Raychev, Nikolay. “Classical cryptography in quantum context. “Proceedings of the IEEE 10 (2012): 2015.
Rebeiro, Chester, Debdeep Mukhopadhyay, and Sarani Bhattacharya. “Modern cryptography.” Timing Channels in Cryptography. Springer International Publishing. 2015. 13-35.
Downloads
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.