Comparative Study of Security Aspects of Various Symmetric Key Encryption Algorithms

Authors

  • Sreeja Rajesh
  • Varghese Paul

Keywords:

Cryptography, Symmetric Key Encryption, Public Key Cryptosystem, Secret Key

Abstract

Symmetric Key Cryptography also called secret key cryptography is a simpler and faster means of data transfer through an unreliable channel. It requires fewer overheads in terms of speed and energy cost than Public Key cryptosystem. This paper provides an insight into various security aspects of different Symmetric Key Encryption Algorithms.

References

Shipra Jain, Vishal Bhatnagar, “Bit Based Symmetric Encryption Method Using DNA sequenceâ€, pp495-498, 2014 IEEE

M.E. Jones, “Albrecht Kossel, A Biographical Sketchâ€, Yale Journal of Medicine, Vol. 26, Issue No. 1, 1953, pp.80-97.

P. Jhansi Rani, S. Durga Bhavani, “Symmetric Encryption using Logistic Mapâ€, IEEE 2012.

R. L. Devaney, “An Introduction to chaotic dynamical systemsâ€, Addison-Wesley, 1989.

Dus ans Gupta, Planar Geometry(2nd edition).

Mohammad Jabed Morshed .chowdhury, Tapas Pal, “A New Symmetric Key Encryption Algorithm based on 2-d Geometry.

Phillip Rogaway, “Nounce Based Symmetric Encryptionâ€, B.Roy and W. Meier(Eds.): FSE 2004, LNCS 3017, pp.348-359, 2004.

P.Rogaway, M.Bellare,J.Black and T.Krovertz. OCB: block-cipher mode of operation for efficient authenticated encryption. Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS ’01), ACM Press, pp. 196–205, 2001.

P.Rogaway, Authenticated-encryption with associated-data. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS ’02), ACM Press, pp. 98–107, 2002.

D.Dolev, C.Dwork and M. Naor. Non-malleable cryptography. SIAM J. Computing, vol. 30, no. 2, pp. 391–437, 2000.

Muna Abdulla Al Shehhi , Joonsang Baek, Chan Yeob Yeun. “The Use of Boolean Functions in Stream Ciphersâ€, IEEE 6th Inter. Conf. Inf. Tech, pp. 29-33, 2011.

C. Carlet. “ Constracting balanced functions with optimum algebraic immunity,†IEEE Inter. Symp. Inf. Theorey, pp. 451-455, 2007.

L. Burnett, W. Millan, E. Dawson and A. Clark, “ Simple methods for generating better Boolean functions with good cryptographic proporties,†Australasian Journal of Combinatorics, vol. 29, pp. 231- 247, 2004.

E. Elsheh, A. B. Hamza and A. Youssef, “ON THE NONLINEARITY PROFILE OF CRYPTOGRAPHIC BOOLEAN FUNCTIONS,†IEEE Canad. Conf. Elec. Comp. Eng., pp. 1767- 1770, 2008.

Downloads

How to Cite

Rajesh, S., & Paul, V. (2015). Comparative Study of Security Aspects of Various Symmetric Key Encryption Algorithms. Asian Journal of Engineering and Technology, 3(4). Retrieved from https://ajouronline.com/index.php/AJET/article/view/3064

Issue

Section

Articles