CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Symmetric Key Cryptographic Algorithm

by Ayushi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 15
Year of Publication: 2010
Authors: Ayushi
10.5120/331-502

Ayushi . A Symmetric Key Cryptographic Algorithm. International Journal of Computer Applications. 1, 15 ( February 2010), 1-4. DOI=10.5120/331-502

@article{ 10.5120/331-502,
author = { Ayushi },
title = { A Symmetric Key Cryptographic Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 15 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number15/331-502/ },
doi = { 10.5120/331-502 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:42:20.022795+05:30
%A Ayushi
%T A Symmetric Key Cryptographic Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 15
%P 1-4
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Any communication in the language that you and I speak-that is the human language, takes the form of plain text or clear text. That is, a message in plain text can be understood by anybody knowing the language as long as the message is not codified in any manner. So, now we have to use coding scheme to ensure that information is hidden from anyone for whom it is not intended, even those who can see the coded data.

References
  1. S. William, Cryptography and Network Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc., 1999 pp 23-50
  2. Computer and Network security by ATUL KAHATE
  3. Fundamentals of Computer Security, Springer publications "Basic Cryptographic Algorithms", an article available at www.itsc.state.md.us/oldsite/info/InternetSecurity/Crypto/CryptoIntro.htm#Algorithms
  4. S. Hebert, "A Brief History of Cryptography", an article available at http://cybercrimes.net/aindex.html
  5. "Introduction to Public-Key Cryptography", an article available at developer.netscape.com/docs/manuals/security/pkin/contents.htm
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Network security Symmetric Key