2016 International Conference on ICT in Business Industry &Amp; Government (ICTBIG) 2016
DOI: 10.1109/ictbig.2016.7892684
|View full text |Cite
|
Sign up to set email alerts
|

A survey on conventional encryption algorithms of Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 4 publications
0
13
0
Order By: Relevance
“…Keys must be kept secret on transferring, if either is compromised secure communication is impossible in further. It was also known as conventional encryption [2].…”
Section: Symmetric Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Keys must be kept secret on transferring, if either is compromised secure communication is impossible in further. It was also known as conventional encryption [2].…”
Section: Symmetric Encryptionmentioning
confidence: 99%
“…This is an endeavour to guarantee privacy. The network to indulge the above said, propound numerous conventional encryption algorithms processed sequentially named underneath DES, AES, TDEA, IDEA, Blowfish, RC2, RC4, RC5, CAST 128, [2]- [6] etc. On comparison among these algorithms on data size of wide range and their ability to secure and protect data against attacks ascertained to be highly in securable which resulting at low speed.…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…Table 1 shows the classification of schemes based on the literature from the last decade. Neural-based Poetry Generation [4] neuralB Arbitrary Algorithm Encryption [5] AAE Encoding Hiding the Message into An Excel Graph [6] EXCELg RJDA Algorithm [7] RJDA Alphabet Index Matrix (English & Malayalam) [8] ALPHAiM Encoding of Hindi Text [9] EnHindiT Visual Cryptography Schemes [10] VCrypS Homomorphic Encryption Scheme [11] HES A Boots Trappable Encryption Scheme [12] trapEnS Huffman Coding Algorithm [13] HCA Elliptic Curve Cryptography(Ecc) [14] ECC DWT Domain of A Carrier Image [15] DWT Watermark [16] Ws Encapsulation Schemes [17] ENCAPs [25] AES Rivest-Shamir-Adlema Algorithm (RSA) [11], [18], [19], [26] RSA Data Encryption Standard (DES) [23], [27] DES LSB [5], [12], [28] LSB Homomorphic Encryption Scheme [21], [22], [26] HES Conventional Encryption Algorithms Blowfish [23] CEABW Binary RSA Encryption Algorithm (BREA) [19] BREA Symmetric Key Encryption [23], [29], [30] SKE RDH Schemes [31] RDH Huffman Encoding Algorithm [28] HEA Transposition Cryptography Algorithm [32] TCA A Boots trappable Encryption Scheme [12] BTRS ECC Decryption [14] ECC ECR (Encryption with Cover Text and Reordering) [33] ECR…”
Section: Review Categorymentioning
confidence: 99%
“…It is successor of SAFER, Blowfish and Square. Similar to AES, Twofish [6,7,17] also has a fixed block size and different key lengths extendable up to 256bitswith a total of 16 rounds. Twofish has a feistel structure.…”
Section: Introductionmentioning
confidence: 99%