A Comparative Survey on Symmetric Key Encryption Techniques
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 5
Abstract
Nowadays, the use of internet are growing increasingly across the world, security becomes a prime concern of issue for the society. Earlier security was a major issue for military applications but now the area of applications has been enhanced since most of the communication takes place over the web. Cryptography is an area of computer science which is developed to provide security for the senders and receivers to transmit and receive confidential data through an insecure channel by a means of process called Encryption/ Decryption. Cryptography ensures that the message should be sent without any alterations and only the authorized person can be able to open and read the message. A number of cryptographic techniques are developed for achieving secure communication. There are basically two techniques of cryptography- Symmetric and Asymmetric. This paper presents a detailed study of most of the symmetric encryption techniques with their advantages and limitations over each other.
Authors and Affiliations
Monika Agrawal , Pradeep Mishra
Agile Processes and Methodologies: A Conceptual Study
This paper deals with the comparative study of agile processes. The paper will serve as guide to other software development process models. Agile processes have important applications in the areas of software project man...
Introducing a New Language for Stream Applications
Stream programs represent an important class of high-performance computing. These programs are rich in parallelism and can be naturally targeted to distributed and multi-core architectures. Since computer architectures g...
Implementation of a Secured system with Roaming Server and Roaming Ports
The main goal of this paper is to design and implement a secured system against Server hijacking, which leads to Denial of Service (DoS) [5] attacks. This system uses more than one server for providing security. But only...
Bitwise Operations Based Encryption and Decryption
In this paper, variable block length based character/bit level ransformation has been proposed for encryption and cryption, where a block of characters /few bits has taken into account. he originated text is transfor...
Observer Design for Simultaneous State and Faults Estimation
This paper addresses the problem of state and faults estimation for Takagi-Sugeno nonlinear systems. Based on this structure for modeling, a proportional integralmultiple observer with unknown inputs is proposed in order...