CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Symmetric Key Cryptography: Technological Developments in the Field

by Md. Sarfaraz Iqbal, Shivendra Singh, Arunima Jaiswal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 15
Year of Publication: 2015
Authors: Md. Sarfaraz Iqbal, Shivendra Singh, Arunima Jaiswal
10.5120/20631-3248

Md. Sarfaraz Iqbal, Shivendra Singh, Arunima Jaiswal . Symmetric Key Cryptography: Technological Developments in the Field. International Journal of Computer Applications. 117, 15 ( May 2015), 23-26. DOI=10.5120/20631-3248

@article{ 10.5120/20631-3248,
author = { Md. Sarfaraz Iqbal, Shivendra Singh, Arunima Jaiswal },
title = { Symmetric Key Cryptography: Technological Developments in the Field },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 15 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number15/20631-3248/ },
doi = { 10.5120/20631-3248 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:30.051046+05:30
%A Md. Sarfaraz Iqbal
%A Shivendra Singh
%A Arunima Jaiswal
%T Symmetric Key Cryptography: Technological Developments in the Field
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 15
%P 23-26
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents the various developments and emerging trends in the symmetric key cryptography technique. It provides an overview of latest inventions and approaches that are implemented in the recent scenario for the betterment of private key cryptography technique with respect to its efficiency, effectiveness, etc.

References
  1. Computer Networks and Computer Securtiy by Kartik Krishnan, Lecture 22-24, 2004
  2. Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography by A. Murat Fiskiran and Ruby B. Lee, Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) 0-7695-2315-3/05 $ 20. 00 IEEE.
  3. An Instruction-Level Distributed Processor for Symmetric-Key Cryptography by Adam J. Elbirt, Member, IEEE, and Christof Paar, Member, IEEE, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 5, MAY 2005
  4. A Password-based Key Establishment Protocol with Symmetric Key Cryptography by Imran Erguler and Emin Anarim, IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, 978-0-7695-3393-3/08 $25. 00 © 2008 IEEE DOI 10. 1109/WiMob. 2008. 112
  5. Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography by Sean O'Melia ? , Member, IEEE, and AJ Elbirt † , Member, IEEE, 2008 Annual Computer Security Applications Conference, 1063-9527/08 $25. 00 © 2008 IEEE DOI 10. 1109/ACSAC. 2008. 10
  6. Enhanced "ULTRA GRIDSEC": Enhancing High Performance Symmetric Key Cryptography Schema Using Pure Peer To Peer Computational Grid Middleware (HIMAN) by HIsham A. Kholidy, Abdulrahman A. Azab, Safia H. Deif, 978-1-4244-2020-9/08/$25. 00 02008 IEEE
  7. The Comparisons between Public key and Symmetric key Cryptography in Protecting Storage Systems by Lanxiang Chen, Shuming Zhou, 20IO International Conference on Computer Application and System Modeling (ICCASM 2010), 978-1-4244-723 7-6/10/$26. 00 . 2010 IEEE
  8. An Efficient Acceleration of Symmetric Key Cryptography Using General Purpose Graphics Processing Unit by Fan Wu, Chung-han Chen, and Hira Narang, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, 978-0-7695-4095-5/10 $26. 00 © 2010 IEEE DOI 10. 1109/SECURWARE. 2010. 24
  9. A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm by D. Chatterjee, J. Nath, S. Dasgupta, A. Nath, 2011 International Conference on Communication Systems and Network Technologies, 978-0-7695-4437-3/11 $26. 00 © 2011 IEEE DOI 10. 1109/CSNT. 2011. 25
  10. Secure extensions of FPGA soft core processors for symmetric key cryptography by Lubos GASPAR, Viktor FISCHER, Lilian BOSSUET, Robert FOUQUET, reference.
  11. An Integrated Symmetric key Cryptography Algorithm using Generalised modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm by Debanjan Das1, Megholova Mukherjee2, Neha Choudhary3, Asoke Nath4, 978-1-4673-0126-8/11/$26. 00 c 2011 IEEE
  12. An improved Symmetric key cryptography with DNA based strong cipher by Bibhash Roy, Gautam Rakshit, Pratim Singha, Atanu Majumder, Debabrata Datta, 978-1-4244-9190-2/11/$26. 00 ©2011 IEEE
  13. An Efficient and Effective Lossless symmetric Key cryptography algorithm for an Image by NIraj Kumar, reference
  14. Application of Cellular Automata in Symmetric Key Cryptography by Satyabrata Roy, Subrata Nandi, Jayanti Dansana, Prasant Kumar Pattnaik, International Conference on Communication and Signal Processing, April 3-5, 2014, India, 978-1-4799-3358-7114/$31. 00 ©2014 IEEE
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography cipher encryption decryption symmetric key.