{"title":"A Review Paper on DES, AES, RSA Encryption Standards","authors":"Aljaafari Hamza, B. Kumar","doi":"10.1109/SMART50582.2020.9336800","DOIUrl":null,"url":null,"abstract":"Cryptography is wide domain with many subs. The objective of this review paper is to give light review for readers and students of the three common used algorithm two in symmetric cryptography DES, AES and one in asymmetric cryptography RSA. Allowing the reader to have simple understanding of the background history of the algorithm in review and the key functional cipher operation of the algorithm. Accordingly summary of strength and weakness of each algorithm under the review will be highlighted. And how the security goals is such confidentiality and integrity are achieve using the mentioned algorithms. The paper will sequentially list and review the said algorithms and clarify the relational between them. Such as the relation between the symmetric and asymmetric algorithm the one with secret key and the ones with key pairs. The paper may insight some of the research window for upcoming scholar research in the field of cryptography.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMART50582.2020.9336800","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
Cryptography is wide domain with many subs. The objective of this review paper is to give light review for readers and students of the three common used algorithm two in symmetric cryptography DES, AES and one in asymmetric cryptography RSA. Allowing the reader to have simple understanding of the background history of the algorithm in review and the key functional cipher operation of the algorithm. Accordingly summary of strength and weakness of each algorithm under the review will be highlighted. And how the security goals is such confidentiality and integrity are achieve using the mentioned algorithms. The paper will sequentially list and review the said algorithms and clarify the relational between them. Such as the relation between the symmetric and asymmetric algorithm the one with secret key and the ones with key pairs. The paper may insight some of the research window for upcoming scholar research in the field of cryptography.