• DocumentCode
    3562707
  • Title

    A study and analysis on symmetric cryptography

  • Author

    Chandra, Sourabh ; Bhattacharyya, Siddhartha ; Paira, Smita ; Alam, Sk Safikul

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Calcutta Inst. of Technol., Kolkata, India
  • fYear
    2014
  • Firstpage
    1
  • Lastpage
    8
  • Abstract
    Technology is advancing day-to-day. For a better and faster technology, information security is a must. This requires data authentication at the execution levels. Cryptography is a useful tool through which secure data independency can be established. It uses two basic operations namely encryption and decryption for secure data communication. A large number of cryptographic techniques have been proposed and implemented so far. In this paper, we have surveyed some of the proposed mechanisms based on Symmetric Key Cryptography and have made a basic comparison study among them. The basic features, advantages, drawbacks and applications of various Symmetric Key Cryptography algorithms have been mentioned in this paper.
  • Keywords
    cryptography; data communication; data authentication; data communication security; data independency security; decryption; encryption; execution levels; information security; symmetric key cryptography technique analysis; Algorithm design and analysis; Authentication; Encryption; Protocols; Public key; Asymmetric key cryptography; Blowfish; Cryptography; Peer-to-Pee; Public key certificate; Reed-Solomon codes; Symmetric key cryptography;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Science Engineering and Management Research (ICSEMR), 2014 International Conference on
  • Print_ISBN
    978-1-4799-7614-0
  • Type

    conf

  • DOI
    10.1109/ICSEMR.2014.7043664
  • Filename
    7043664