Encryption is one the most effective approach to
achieve data security and privacy. The Encryption
techniques hide the original content of a data in such a way
that the original information is recovered only through using
a key known as decryption process. The objective of the
encryption is to secure or protect data from unauthorized
access in term of viewing or modifying the data. Encryption
can be implemented occurs by using some substitute
technique, shifting technique, or mathematical operations. By
applying these techniques we can generate a different form of
that data which can be difficult to understand by any one.
The original data is referred to as the plaintext and the
encrypted data as the cipher text. Several symmetric key base
algorithms have been developed in the past year. In this
paper we proposed a comparative study over symmetric key
based algorithm using some parameter like scalability, key
size, security etc.
Pramod Gorakh Patil : M.Tech, RGPV Bhopal, Lord Krishna College of Technology Indore
Indore, MP, India
Vijay Kumar Verma : Asst. Professor, M.Tech, RGPV Bhopal, Lord Krishna College of Technology Indore
Indore, MP, India
Symmetric
Encryption
Decryption
Scalability
Security
Plaintext
Chippertext
Cryptography plays an important role in data security and
privacy. Several algorithms have been developed in the
past year and by comparison of different parameters used
in algorithms give significance of the algorithms.
Wecompare some algorithm on the basis of certain
parameters. Some of algorithm are flexible some ofthem
provides high security and some of them are modifiable.
[1] Uttam Kr. MondalSatyendraNathMandal “Frame
Based Symmetric Key Cryptography” Int. J. Advanced
Networking and Applications 762Volume: 02, Issue:
04, Pages: 762-769 2011.
[2] AartiSoni, SuyashAgrawal “Using Genetic Algorithm
for Symmetric keyGeneration in Image Encryption”
International Journal of Advanced Research in
Computer Engineering & Technology
(IJARCET)Volume 1, Issue 10, December 2012 ISSN:
2278 – 1323.
[3] SomdipDey “An Integrated Symmetric Key
Cryptographic Method Amalgamation of TTJSA
Algorithm, Advanced Caesar Cipher Algorithm, Bit
Rotation and Reversal Method: SJA Algorithm” I.J.Modern Education and Computer Science, 2012, 5,
1-9 Published Online June 2012 in MECS.
[4] Monika Agrawal, Pradeep Mishra “Modified Approach
for Symmetric KeyCryptography Based on Blowfish
Algorithm” International Journal of Engineering and
Advanced Technology (IJEAT)ISSN: 2249 – 8958,
Volume-1, Issue-6, August 2012.
[5] Sombir Singh Sunil K. MaakarDr.Sudesh Kumar
“Enhancing the Security of DES Algorithm Using
Transposition Cryptography Techniques”.International
Journal of Advanced Research in Computer Science
and Software Engineering Volume 3, Issue 6, June
2013 ISSN: 2277 128X
[6] Satish Kumar Garg” Modified Encryption and
Decryption Using Symmetric Keys at Two Stages:
Algorithm SKG 1.2” International Journal of Advanced
Research in
[7] Computer Science and Software Engineering Volume
4, Issue 6, June 2014 ISSN: 2277 128X
[8] Saranya K and Mohanapriya R “A Review on
Symmetric Key Encryption Techniques in
Cryptography “.International Journal of Science,
Engineering and Technology Research (IJSETR),
Volume 3, Issue 3, March 2014
[9] Sanket A. Ubhad, Prof. Nilesh Chaubey, Prof. Shyam
P. DubeyASCII Based Cryptography Using Matrix
Operation, Palindrome Range, Unique id International
Journal of Computer Science and Mobile
ComputingIJCSMC, Vol. 4, Issue. 8, August 2015.
[10] Mohammad ShahnawazNasir, PrakashKuppuswamy
“Implementation of Biometric Security using Hybrid
Combination of RSA and Simple Symmetric Key
Algorithm “International Journal of Innovative
Research in Computer and Communication
Engineering (An ISO 3297: 2007 Certified
Organization) Vol. 1, Issue 8, October 2013.
[11] RachnaArora and AnshuParashar“Secure User Data in
Cloud Computing Using Encryption Algorithms”
International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-
1926.
[12] Satyajeet R.Shinge, Rahul Patil“An Encryption
Algorithm Based on ASCII Valueof Data” (IJCSIT)
International Journal of Computer Science and
Information Technologies, Vol. 5 (6) , 2014, 7232-
7234
[13] Ch. Santhosh Reddy, Ch. Sowjanya, P. Praveena, Prof
Shalini L Poly-alphabetic Symmetric Key Algorithm
Using Randomized Prime Numbers International
Journal of Scientific and Research Publications,
Volume 2, Issue 9, September 2012 1 ISSN 2250-3153