2016
DOI: 10.5120/ijca2016911203
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Symmetric Key Encryption Techniques in Cryptography

Abstract: In the era of digital communication, the information sharing is rapidly increased. All the data which being sent or received are vulnerable to many active and passive attacks. Therefore, secure the data during communication is the most important concern. Cryptography performs an essential role to secure the communication in network and it comes with an amazing solution to supply the needed protection against the intruders of data. Over a considerable time, the techniques of data encryption took a huge leap fro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(3 citation statements)
references
References 7 publications
(5 reference statements)
0
3
0
Order By: Relevance
“…This technique employs a solitary key for both the encryption and decryption of data [11,12]. This key is mutually shared by the data's sender and receiver.…”
Section: Symmetric Encryptionmentioning
confidence: 99%
“…This technique employs a solitary key for both the encryption and decryption of data [11,12]. This key is mutually shared by the data's sender and receiver.…”
Section: Symmetric Encryptionmentioning
confidence: 99%
“…Where E is Encryption Process, D is Decryption Process,K is Key, P is Original or Plaintext message and C is Ciphertext. To perform the encryption process, input in the form of plaintext and key is needed so that it can produce ciphertext [10]. Meanwhile, the decryption process requires input in the form of ciphertext and keys to be able to produce plaintext.…”
Section: Encryption Decriptionmentioning
confidence: 99%
“…The more complex the encryption technology, the more demanding it is [3]. Encryption and decryption are both included in a big field called cryptography [4]- [7], which is also be concentrated in this paper.…”
Section: Introductionmentioning
confidence: 98%