2015
DOI: 10.4236/jis.2015.62009
|View full text |Cite
|
Sign up to set email alerts
|

Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm

Abstract: With the rapid evolution of data exchange in network environments, information security has been the most important process for data storage and communication. In order to provide such information security, the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This paper presents a new emerging trend of modern symmetric encryption algorithm by development of the advanced encryption standard (AES) algorithm. The new development focuses… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…In Asymmetric key, each node, the sender and receiver, have two keys which are the public key that known to all nodes in the network and secret key which is private [5]. Symmetric cryptography is less computation and consuming less energy than Asymmetric Key [4].…”
Section: Introductionmentioning
confidence: 99%
“…In Asymmetric key, each node, the sender and receiver, have two keys which are the public key that known to all nodes in the network and secret key which is private [5]. Symmetric cryptography is less computation and consuming less energy than Asymmetric Key [4].…”
Section: Introductionmentioning
confidence: 99%
“…Jasim et al in [16] introduced an enhanced version of AES algorithm, quantum-AES which is based on the generation of dynamic quantum S-box utilizing the cipher key generated by quantum key distribution in both, online and offline mode. This QAES generates more complicated and unbreakable key that is utilized to generate dynamic sbox.…”
Section: Literature Surveymentioning
confidence: 99%
“…In layman's words, cryptography means information security and the most effective way to ensure it is encryption-decryption techniques [5]. These techniques can be either symmetric or asymmetric based on the usage of the key, where a key is a numeric or may be some special symbol which is utilized to convert the plain text into cipher text and vice-versa [16]. In a symmetric cryptosystem such as AES, the communicating parties use a single key for both, enciphering-deciphering.…”
Section: Introductionmentioning
confidence: 99%
“…However, there are also more exotic applications. These applications include: the ability to transfer quantum information without transmitting physical particles [ 83 ], quantum authentication [ 84 ], quantum-advanced encryption standard (Q-AES) [ 85 ], and quantum unclonable functions for authentication [ 86 ].…”
Section: -2025: the Second Revolution In Processmentioning
confidence: 99%