A Comparative Survey on Symmetric Key Encryption Techniques
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 5
Abstract
Nowadays, the use of internet are growing increasingly across the world, security becomes a prime concern of issue for the society. Earlier security was a major issue for military applications but now the area of applications has been enhanced since most of the communication takes place over the web. Cryptography is an area of computer science which is developed to provide security for the senders and receivers to transmit and receive confidential data through an insecure channel by a means of process called Encryption/ Decryption. Cryptography ensures that the message should be sent without any alterations and only the authorized person can be able to open and read the message. A number of cryptographic techniques are developed for achieving secure communication. There are basically two techniques of cryptography- Symmetric and Asymmetric. This paper presents a detailed study of most of the symmetric encryption techniques with their advantages and limitations over each other.
Authors and Affiliations
Monika Agrawal , Pradeep Mishra
ICS: An Interactive Control System for Simulating the Probability of Car Accidents with Object Oriented Paradigm and Cellular Automaton
As the number of vehicles continues to grow, more accidents occur most likely due to careless driving of the drivers who do not maintain the safety distance. To assist managers in their tasks of traffic planning, a syste...
Implementation of ETAS (Embedding Text in Audio Signal) Model to Ensure Secrecy
Steganography is the art of hiding information that evolves as a new secret communication technology. For a long period time, information hiding was done using plain text, still images, video and IP datagram. Embedding s...
Comparative Analysis of Reactive and Proactive Protocol of Mobile Ad-Hoc Network
Mobile ad hoc network “MANET” is a collection of wireless communication nodes which communicates without any fixed infrastructure. The nodes are mobile and forming a dynamic temporary network without any use of existing...
Populating domain specific words from Academic web pages of Tamil Nadu Universities to build domain ontology for educational websites.
Machine translation from one natural language to the other is a challenging task. One of the methods of doing machine translation is using Interlingua based approach. In that approach the source language can be represent...
Performance Evaluation of Ad Hoc On Demand Distance Vector in MANETs with varying Network Size using NS-2 Simulation
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a network topology without the use of any existing network infrastructure or centralized administration. Routing is the task of...