A Comparative Security Study Review on Symmetric Key Cryptosystem Based Algorithms?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 7)Publication Date: 2013-07-30
Authors : SSVR Kumar Addagarla Babji Y;
Page : 146-151
Keywords : Spoofing; Encryption; Decryption; Keysize; DES; TDES; AES; IDEA;
Abstract
With the vast growth of the internet various kind of applications are developed for the different kinds of the users. Due to the decreasing cost of the internet and increasing the availability from a large amount of devices and applications the impact of attacks more significant. In such cases security is required to protect the data during the transmission. Generally let us say user ‘A’ transmits the sensitive information to the remote located user ‘B’. In the process an unauthorized intruder let say ‘I’ may monitor the transmission and able to capture, modify and retransmit the information to the next party. To overcome this kind of security vulnerability in the transmission we required to implement the cryptography techniques likes the Symmetric key cryptology and/or Asymmetric key cryptology. In this paper we discussed the security dependencies and its vulnerabilities of the symmetric key crypto algorithms like DES, 3DES, AES, and IDEA.
Other Latest Articles
- The Differential Problem of Two Types of Functions
- Automation of Mathematics Teaching ? Demonstration by Methods of Completing the Square in Solving a Quadratic Equation?
- A STUDY ON IRIS RECOGNITION SYSTEM
- FORECASTING IN SAP-SCM (SUPPLY CHAIN MANAGEMENT)?
- A Modified Back propagation Algorithm for Optical Character Recognition
Last modified: 2013-07-17 15:49:50