Title :
A study and analysis on symmetric cryptography
Author :
Chandra, Sourabh ; Bhattacharyya, Siddhartha ; Paira, Smita ; Alam, Sk Safikul
Author_Institution :
Dept. of Comput. Sci. & Eng., Calcutta Inst. of Technol., Kolkata, India
Abstract :
Technology is advancing day-to-day. For a better and faster technology, information security is a must. This requires data authentication at the execution levels. Cryptography is a useful tool through which secure data independency can be established. It uses two basic operations namely encryption and decryption for secure data communication. A large number of cryptographic techniques have been proposed and implemented so far. In this paper, we have surveyed some of the proposed mechanisms based on Symmetric Key Cryptography and have made a basic comparison study among them. The basic features, advantages, drawbacks and applications of various Symmetric Key Cryptography algorithms have been mentioned in this paper.
Keywords :
cryptography; data communication; data authentication; data communication security; data independency security; decryption; encryption; execution levels; information security; symmetric key cryptography technique analysis; Algorithm design and analysis; Authentication; Encryption; Protocols; Public key; Asymmetric key cryptography; Blowfish; Cryptography; Peer-to-Pee; Public key certificate; Reed-Solomon codes; Symmetric key cryptography;
Conference_Titel :
Science Engineering and Management Research (ICSEMR), 2014 International Conference on
Print_ISBN :
978-1-4799-7614-0
DOI :
10.1109/ICSEMR.2014.7043664