ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Comparative Security Study Review on Symmetric Key Cryptosystem Based Algorithms?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 7)

Publication Date:

Authors : ;

Page : 146-151

Keywords : Spoofing; Encryption; Decryption; Keysize; DES; TDES; AES; IDEA;

Source : Downloadexternal Find it from : Google Scholarexternal


With the vast growth of the internet various kind of applications are developed for the different kinds of the users. Due to the decreasing cost of the internet and increasing the availability from a large amount of devices and applications the impact of attacks more significant. In such cases security is required to protect the data during the transmission. Generally let us say user ‘A’ transmits the sensitive information to the remote located user ‘B’. In the process an unauthorized intruder let say ‘I’ may monitor the transmission and able to capture, modify and retransmit the information to the next party. To overcome this kind of security vulnerability in the transmission we required to implement the cryptography techniques likes the Symmetric key cryptology and/or Asymmetric key cryptology. In this paper we discussed the security dependencies and its vulnerabilities of the symmetric key crypto algorithms like DES, 3DES, AES, and IDEA.

Last modified: 2013-07-17 15:49:50