Recent Advancements on Symmetric Cryptography Techniques -A Comprehensive Case Study

1
Sangapu Venkata Appaji
Sangapu Venkata Appaji
2
Dr. Gomatam V S Acharyulu
Dr. Gomatam V S Acharyulu
1 GRIET affiliated to JNTUH

Send Message

To: Author

GJCST Volume 14 Issue F2

Article Fingerprint

ReserarchID

CSTGVFCA95

Recent Advancements on Symmetric Cryptography Techniques -A Comprehensive Case Study Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Now a day’s Cryptography is one of the broad areas for researchers; because of the conventional block cipher has lost its potency due to the sophistication of modern systems that can break it by brute force. Due to its importance, several cryptography techniques and algorithms are adopted by many authors to secure the data, but still there is a scope to improve the previous approaches. For this necessity, we provide the comprehensive survey which will help the researchers to provide better techniques.

33 Cites in Articles

References

  1. S William (1999). Cryptography and Network Security: Principles and Practice.
  2. S Hebert A Brief History of Cryptography.
  3. Atul Kahate Computer and Network security.
  4. K Gary An Overview of Cryptography.
  5. E Surya,C Divya A Survey on Symmetric Key Encryption Algorithms.
  6. Tony Damico A Brief History Of Cryptography.
  7. (2011). HTTP Cookie.
  8. Oded Goldreich (2001). Foundations of cryptography: basic tools.
  9. C Adams,H Heys,S Tavares,M Wiener (1999). An analysis of the CAST-256 cipher.
  10. Weidong Shi (2005). High efficiency counter mode security architecture via prediction and precomputation.
  11. Abdullah Alkalbany,Hussein,Al Hassan,Magdy Saeb (2005). FPGA implementation of the" pyramids" block cipher.
  12. Shiguo Lian,Jinsheng Sun,Zhiquan Wang (2005). A block cipher based on a suitable use of the chaotic standard map.
  13. Ana G. Guerreiro,Carlos De Araujo (2006). A Neural Key Generator for a Public Block Cipher.
  14. Iain Devlin,Alan Purvis (2007). Purvis, Iain Younie, (born 23 Aug. 1963), QC 2006; a Recorder, since 2010; a Deputy High Court Judge, since 2012.
  15. Ayushi (2010). A Symmetric Key Cryptographic Algorithm.
  16. Wuling Ren,Zhiqian Miao (2010). A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication.
  17. G Manikandan,G Krishnan,N Sairam (2011). A unified block and stream cipher based file encryption.
  18. G Manikandan (2011). Key Recovery from State Information.
  19. Sairam Natarajan,An Ganesan,Krishnan Ganesan (2011). A Novel Approach for Data Security Enhancement Using Multi Level Encryption Scheme.
  20. (2011). A Hybrid Crypto System based on a new Circle-Symmetric key Algorithm and RSA with CRT Asymmetrickey Algorithm for E-commerce Applications.
  21. Neeraj Khanna,Joyshree Nath,Joel James,Sayantan Chakraborty,Amlan Chakrabarti,Asoke Nath (2011). New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm.
  22. A Ganesh (2011). An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based Wireless Sensor Networks.
  23. Yunpeng,Zhang (2011). Index-based symmetric DNA encryption algorithm.
  24. K Sashank,B Reddy,S Kumar (2011). Index based symmetric block encryption.
  25. Lubos Gaspar,Viktor Fischer,Lilian Bossuet,Robert Fouquet (2011). Secure extensions of FPGA soft core processors for symmetric key cryptography.
  26. Mustafa Matalgah,Walid Zibideh,Amer Magableh (2013). Alleviating the effect of the strict avalanche criterion (SAC) of symmetric-key encryption in wireless communication channels.
  27. Kamal Jyoti (2013). Enhanced Amalgam Encryption Approach for Grid Security: A Review.
  28. Janailin Warjri,E Raj (2013). KED-A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69.
  29. Krishna Pandey,Vikas Kumar,Sitesh Rangari,Kumarsinha (2013). An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security.
  30. Obaida Al-Hazaimeh,Mohammad Awad (2013). A New Approach for Complex Encrypting and Decrypting Data.
  31. (2013). Parallelization of AES algorithm for disk encryption using CBC and ICBC modes.
  32. N Radha Aathithan,M Venkatesulu (2013). A complete binary tree structure block cipher for realtime multimedia.
  33. Harsh Verma,Ravindra Kumar,Singh (2013). Enhancement of RC6 block cipher algorithm and comparison with RC5 & RC6.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Sangapu Venkata Appaji. 2014. \u201cRecent Advancements on Symmetric Cryptography Techniques -A Comprehensive Case Study\u201d. Global Journal of Computer Science and Technology - F: Graphics & Vision GJCST-F Volume 14 (GJCST Volume 14 Issue F2): .

Download Citation

Issue Cover
GJCST Volume 14 Issue F2
Pg. 19- 30
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

June 24, 2014

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 8857
Total Downloads: 2275
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Now a day’s Cryptography is one of the broad areas for researchers; because of the conventional block cipher has lost its potency due to the sophistication of modern systems that can break it by brute force. Due to its importance, several cryptography techniques and algorithms are adopted by many authors to secure the data, but still there is a scope to improve the previous approaches. For this necessity, we provide the comprehensive survey which will help the researchers to provide better techniques.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Recent Advancements on Symmetric Cryptography Techniques -A Comprehensive Case Study

Sangapu Venkata Appaji
Sangapu Venkata Appaji GRIET affiliated to JNTUH
Dr. Gomatam V S Acharyulu
Dr. Gomatam V S Acharyulu

Research Journals