2017
DOI: 10.1007/978-981-10-4600-1_22
|View full text |Cite
|
Sign up to set email alerts
|

Traditional and Hybrid Encryption Techniques: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(20 citation statements)
references
References 7 publications
0
20
0
Order By: Relevance
“…It is a symmetric crypto-algorithm that supports 128-bits block size input and uses 128, 192, and 256 bits variable key lengths, precomputed key-dependent S-boxes, and a complex key schedule [20]. Although it is considered to possess good security [15], [16], it was found to be vulnerable from some attacks including differential attack and related key attack [15], [17].…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…It is a symmetric crypto-algorithm that supports 128-bits block size input and uses 128, 192, and 256 bits variable key lengths, precomputed key-dependent S-boxes, and a complex key schedule [20]. Although it is considered to possess good security [15], [16], it was found to be vulnerable from some attacks including differential attack and related key attack [15], [17].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Among symmetric algorithms, Blowfish is considered superior in terms of security, avalanche effect, throughput, memory usage, execution time, and power consumption [14]. It gives better performance compared to other algorithms [15] and demonstrated excellent security as it is known to have no successful attacks [15]- [17]. However, Blowfish became unfavorable to be used because of little block size support despite being known as an unbroken algorithm.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…If a single key is used to perform all three rounds in Triple DES then the key size remains to 56 bits without parity bits that is if only one key leaked the complete procedure gets broken. While if two different keys are used each of 56 bits without parity bits then the total size of key becomes 112 bits [6]. It is also vulnerable as if a single key is determined the other could be determined easily.…”
Section: Triple Desmentioning
confidence: 99%
“…The data encryption is the most traditional approach that secures highly confidential information by employing some conventional algorithm, which already exists or is pre-written. The key generation is one of the most important part of the encryption process [4]. Two methods of key generation exist: symmetric key generation and asymmetric key generation [5].…”
Section: Introductionmentioning
confidence: 99%