This paper demonstrates the symmetric key algorithm and describes how this algorithm works. Also, discuss the most common challenges that facing this cryptosystem and how to solve these aspects, and discuss two major kinds of attackers, also discuss some prior works that related with Symmetric Key Algorithm, also present the proposed solution.
Published in | Mathematics and Computer Science (Volume 2, Issue 3) |
DOI | 10.11648/j.mcs.20170203.12 |
Page(s) | 31-34 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2017. Published by Science Publishing Group |
Symmetric Key, A Public Key, Cryptosystem, Double Key, Asymmetric Key
[1] | Saranya, K., R. Mohanapriya, and J. Udhayan, A review on symmetric key encryption techniques in cryptography. International Journal of Science, Engineering and Technology Research, 2014. 3 (3): p. 539-544. |
[2] | Rejani, R. and D. Krishnan, Study of symmetric key cryptography algorithms. International Journal of Computer Techniques, 2015. 2 (2): p. 45-50. |
[3] | Chandramathi, S., et al., An overview of visual cryptography. International Journal of Computational Intelligence Techniques, ISSN, 2010: p. 0976-0466. |
[4] | Al-Vahed, A. and H. Sahhavi, An overview of modern cryptography. World Applied Programming, 2011. 1 (1): p. 3-8. |
[5] | Serjantov, A. and P. Sewell. Passive attack analysis for connection-based anonymity systems. in European Symposium on Research in Computer Security. 2003. Springer. |
[6] | Gilbert, H., M. Robshaw, and H. Sibert, Active attack against HB/sup+: a provably secure lightweight authentication protocol. Electronics Letters, 2005. 41 (21): p. 1169-1170. |
[7] | Wu, Q., et al. Asymmetric group key agreement. in Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2009. Springer. |
[8] | Surya, E. and C. Diviya, A Survey on Symmetric Key Encryption Algorithms. International Journal of Computer Science & Communication Networks, 2012. 2 (4): p. 475-477. |
[9] | Chan, A.-F. Symmetric-key homomorphic encryption for encrypted data processing. in Communications, 2009. ICC'09. IEEE International Conference on. 2009. IEEE. |
[10] | Agrawal, H. and M. Sharma, Implementation and analysis of various symmetric cryptosystems. Indian Journal of Science and Technology, 2010. 3 (12): p. 1173-1176. |
[11] | Nath, A., S. Ghosh, and M.A. Mallick. Symmetric Key Cryptography Using Random Key Generator. in Security and Management. 2010. |
[12] | Elbirt, A. J. and C. Paar, An instruction-level distributed processor for symmetric-key cryptography. IEEE Transactions on Parallel and distributed Systems, 2005. 16 (5): p. 468-480. |
[13] | Burke, J., J. McDonald, and T. Austin, Architectural support for fast symmetric-key cryptography. ACM SIGARCH Computer Architecture News, 2000. 28 (5): p. 178-189. |
[14] | Thakur, J. and N. Kumar, DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis. International journal of emerging technology and advanced engineering, 2011. 1 (2): p. 6-12. |
[15] | Wang, H., et al. Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control. in Distributed Computing Systems, 2008. ICDCS'08. The 28th International Conference on. 2008. IEEE. |
APA Style
Mostafa Al-Romi, Raid Al-Malki. (2017). Hybrid Symmetric Volatile Encryption Algorithm Using Array. Mathematics and Computer Science, 2(3), 31-34. https://doi.org/10.11648/j.mcs.20170203.12
ACS Style
Mostafa Al-Romi; Raid Al-Malki. Hybrid Symmetric Volatile Encryption Algorithm Using Array. Math. Comput. Sci. 2017, 2(3), 31-34. doi: 10.11648/j.mcs.20170203.12
AMA Style
Mostafa Al-Romi, Raid Al-Malki. Hybrid Symmetric Volatile Encryption Algorithm Using Array. Math Comput Sci. 2017;2(3):31-34. doi: 10.11648/j.mcs.20170203.12
@article{10.11648/j.mcs.20170203.12, author = {Mostafa Al-Romi and Raid Al-Malki}, title = {Hybrid Symmetric Volatile Encryption Algorithm Using Array}, journal = {Mathematics and Computer Science}, volume = {2}, number = {3}, pages = {31-34}, doi = {10.11648/j.mcs.20170203.12}, url = {https://doi.org/10.11648/j.mcs.20170203.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.mcs.20170203.12}, abstract = {This paper demonstrates the symmetric key algorithm and describes how this algorithm works. Also, discuss the most common challenges that facing this cryptosystem and how to solve these aspects, and discuss two major kinds of attackers, also discuss some prior works that related with Symmetric Key Algorithm, also present the proposed solution.}, year = {2017} }
TY - JOUR T1 - Hybrid Symmetric Volatile Encryption Algorithm Using Array AU - Mostafa Al-Romi AU - Raid Al-Malki Y1 - 2017/07/07 PY - 2017 N1 - https://doi.org/10.11648/j.mcs.20170203.12 DO - 10.11648/j.mcs.20170203.12 T2 - Mathematics and Computer Science JF - Mathematics and Computer Science JO - Mathematics and Computer Science SP - 31 EP - 34 PB - Science Publishing Group SN - 2575-6028 UR - https://doi.org/10.11648/j.mcs.20170203.12 AB - This paper demonstrates the symmetric key algorithm and describes how this algorithm works. Also, discuss the most common challenges that facing this cryptosystem and how to solve these aspects, and discuss two major kinds of attackers, also discuss some prior works that related with Symmetric Key Algorithm, also present the proposed solution. VL - 2 IS - 3 ER -