A Recent Survey on Different Symmetric Key Based Cryptographic Algorithms  
  Authors : Pramod Gorakh Patil; Vijay Kumar Verma

 

Encryption is one the most effective approach to achieve data security and privacy. The Encryption techniques hide the original content of a data in such a way that the original information is recovered only through using a key known as decryption process. The objective of the encryption is to secure or protect data from unauthorized access in term of viewing or modifying the data. Encryption can be implemented occurs by using some substitute technique, shifting technique, or mathematical operations. By applying these techniques we can generate a different form of that data which can be difficult to understand by any one. The original data is referred to as the plaintext and the encrypted data as the cipher text. Several symmetric key base algorithms have been developed in the past year. In this paper we proposed a comparative study over symmetric key based algorithm using some parameter like scalability, key size, security etc.

 

Published In : IJCAT Journal Volume 3, Issue 2

Date of Publication : February 2016

Pages : 92 - 95

Figures :02

Tables : 04

Publication Link :A Recent Survey on Different Symmetric Key Based Cryptographic Algorithms

 

 

 

Pramod Gorakh Patil : M.Tech, RGPV Bhopal, Lord Krishna College of Technology Indore Indore, MP, India

Vijay Kumar Verma : Asst. Professor, M.Tech, RGPV Bhopal, Lord Krishna College of Technology Indore Indore, MP, India

 

 

 

 

 

 

 

Symmetric

Encryption

Decryption

Scalability

Security

Plaintext

Chippertext

Cryptography plays an important role in data security and privacy. Several algorithms have been developed in the past year and by comparison of different parameters used in algorithms give significance of the algorithms. Wecompare some algorithm on the basis of certain parameters. Some of algorithm are flexible some ofthem provides high security and some of them are modifiable.

 

 

 

 

 

 

 

 

 

[1] Uttam Kr. MondalSatyendraNathMandal “Frame Based Symmetric Key Cryptography” Int. J. Advanced Networking and Applications 762Volume: 02, Issue: 04, Pages: 762-769 2011. [2] AartiSoni, SuyashAgrawal “Using Genetic Algorithm for Symmetric keyGeneration in Image Encryption” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)Volume 1, Issue 10, December 2012 ISSN: 2278 – 1323. [3] SomdipDey “An Integrated Symmetric Key Cryptographic Method Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm” I.J.Modern Education and Computer Science, 2012, 5, 1-9 Published Online June 2012 in MECS. [4] Monika Agrawal, Pradeep Mishra “Modified Approach for Symmetric KeyCryptography Based on Blowfish Algorithm” International Journal of Engineering and Advanced Technology (IJEAT)ISSN: 2249 – 8958, Volume-1, Issue-6, August 2012. [5] Sombir Singh Sunil K. MaakarDr.Sudesh Kumar “Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques”.International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 6, June 2013 ISSN: 2277 128X [6] Satish Kumar Garg” Modified Encryption and Decryption Using Symmetric Keys at Two Stages: Algorithm SKG 1.2” International Journal of Advanced Research in [7] Computer Science and Software Engineering Volume 4, Issue 6, June 2014 ISSN: 2277 128X [8] Saranya K and Mohanapriya R “A Review on Symmetric Key Encryption Techniques in Cryptography “.International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 3, March 2014 [9] Sanket A. Ubhad, Prof. Nilesh Chaubey, Prof. Shyam P. DubeyASCII Based Cryptography Using Matrix Operation, Palindrome Range, Unique id International Journal of Computer Science and Mobile ComputingIJCSMC, Vol. 4, Issue. 8, August 2015. [10] Mohammad ShahnawazNasir, PrakashKuppuswamy “Implementation of Biometric Security using Hybrid Combination of RSA and Simple Symmetric Key Algorithm “International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 1, Issue 8, October 2013. [11] RachnaArora and AnshuParashar“Secure User Data in Cloud Computing Using Encryption Algorithms” International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1922- 1926. [12] Satyajeet R.Shinge, Rahul Patil“An Encryption Algorithm Based on ASCII Valueof Data” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7232- 7234 [13] Ch. Santhosh Reddy, Ch. Sowjanya, P. Praveena, Prof Shalini L Poly-alphabetic Symmetric Key Algorithm Using Randomized Prime Numbers International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012 1 ISSN 2250-3153