DocumentCode
3562707
Title
A study and analysis on symmetric cryptography
Author
Chandra, Sourabh ; Bhattacharyya, Siddhartha ; Paira, Smita ; Alam, Sk Safikul
Author_Institution
Dept. of Comput. Sci. & Eng., Calcutta Inst. of Technol., Kolkata, India
fYear
2014
Firstpage
1
Lastpage
8
Abstract
Technology is advancing day-to-day. For a better and faster technology, information security is a must. This requires data authentication at the execution levels. Cryptography is a useful tool through which secure data independency can be established. It uses two basic operations namely encryption and decryption for secure data communication. A large number of cryptographic techniques have been proposed and implemented so far. In this paper, we have surveyed some of the proposed mechanisms based on Symmetric Key Cryptography and have made a basic comparison study among them. The basic features, advantages, drawbacks and applications of various Symmetric Key Cryptography algorithms have been mentioned in this paper.
Keywords
cryptography; data communication; data authentication; data communication security; data independency security; decryption; encryption; execution levels; information security; symmetric key cryptography technique analysis; Algorithm design and analysis; Authentication; Encryption; Protocols; Public key; Asymmetric key cryptography; Blowfish; Cryptography; Peer-to-Pee; Public key certificate; Reed-Solomon codes; Symmetric key cryptography;
fLanguage
English
Publisher
ieee
Conference_Titel
Science Engineering and Management Research (ICSEMR), 2014 International Conference on
Print_ISBN
978-1-4799-7614-0
Type
conf
DOI
10.1109/ICSEMR.2014.7043664
Filename
7043664
Link To Document