A Review on Symmetric Key Encryption

Authors

  • Shraddha Rajendra Kore, Komal Dewadas Dhok, Sonika Hanmantrao Mahind, Rohit D. Mane

Keywords:

Plaintext, Ciphertext, Encryption algorithm, Secret key, Decryption algorithm

Abstract

Now a day, the most important thing is to maintain confidentiality and integrity of our data. Due to the large growth of digitalization, data on internet is not secure. Cryptography is the way to secure data while transmitting from one location to another. This theory includes Encryption and Decryption. Or in other words, Encipher and Decipher. There are different types of encryption techniques, like symmetric encryption and asymmetric encryption. This paper focuses on symmetric cipher model and list out different symmetric ciphers.

References

Cryptography-network-security-principles and practices by William Stallings-indianpdf.com_pdf.

Bellare, Mihir, Kenneth G. Paterson, and Phillip Rogaway. “Security of symmetric encryption against mass surveillance.” Advances in Cryptology CRYPTO 2014. Springer Berlin Heidelberg, 2014 1-19.

Raychev, Nikolay. “Classical cryptography in quantum context. “Proceedings of the IEEE 10 (2012): 2015.

Rebeiro, Chester, Debdeep Mukhopadhyay, and Sarani Bhattacharya. “Modern cryptography.” Timing Channels in Cryptography. Springer International Publishing. 2015. 13-35.

https://www.researchgate.net/publication/333118027_A_Review_on_Symmetric_Key_Encryption_Techniques_in_Cryptography

Downloads

How to Cite

Shraddha Rajendra Kore, Komal Dewadas Dhok, Sonika Hanmantrao Mahind, Rohit D. Mane. (2022). A Review on Symmetric Key Encryption. International Journal of Research & Technology, 10(1), 24–28. Retrieved from https://ijrt.org/j/article/view/286

Similar Articles

<< < 1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.