流行对称加密算法的综合分析

Shiraz Saptarshi Ghosh, Harshwardhan Parmar, Prasham Shah, Krishna Samdani
{"title":"流行对称加密算法的综合分析","authors":"Shiraz Saptarshi Ghosh, Harshwardhan Parmar, Prasham Shah, Krishna Samdani","doi":"10.1109/PUNECON.2018.8745324","DOIUrl":null,"url":null,"abstract":"In today’s world, data is termed as the new gold. The need for providing security to the data stored on local storage or at a remote location is a must. Various methods and algorithms are used for securing data one of which is using symmetric key cryptography. It is an encryption technique which uses a single key for the encryption and decryption process. This paper provides an extensive literature survey and puts forth a comparative analysis of the existing symmetric cryptography algorithms (Caesar, Vigenère, Data Encryption Standard, Triple Data Encryption Standard, Extended Data Encryption Standard, Rijndael, Twofish, Blowfish, Modified Blowfish) based on their architecture, flexibility, reliability, security and also states the limitations for each that are essential for secure communication through a wired or wireless medium.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A Comprehensive Analysis Between Popular Symmetric Encryption Algorithms\",\"authors\":\"Shiraz Saptarshi Ghosh, Harshwardhan Parmar, Prasham Shah, Krishna Samdani\",\"doi\":\"10.1109/PUNECON.2018.8745324\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today’s world, data is termed as the new gold. The need for providing security to the data stored on local storage or at a remote location is a must. Various methods and algorithms are used for securing data one of which is using symmetric key cryptography. It is an encryption technique which uses a single key for the encryption and decryption process. This paper provides an extensive literature survey and puts forth a comparative analysis of the existing symmetric cryptography algorithms (Caesar, Vigenère, Data Encryption Standard, Triple Data Encryption Standard, Extended Data Encryption Standard, Rijndael, Twofish, Blowfish, Modified Blowfish) based on their architecture, flexibility, reliability, security and also states the limitations for each that are essential for secure communication through a wired or wireless medium.\",\"PeriodicalId\":166677,\"journal\":{\"name\":\"2018 IEEE Punecon\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE Punecon\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PUNECON.2018.8745324\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Punecon","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PUNECON.2018.8745324","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

在当今世界,数据被称为新的黄金。必须为存储在本地存储或远程位置的数据提供安全性。各种方法和算法用于保护数据,其中一种是使用对称密钥加密。它是一种使用单个密钥进行加密和解密过程的加密技术。本文对现有的对称加密算法(Caesar, vigen,数据加密标准,三重数据加密标准,扩展数据加密标准,Rijndael, Twofish, Blowfish, Modified Blowfish)进行了广泛的文献综述,并根据其架构,灵活性,可靠性,安全性进行了比较分析,并指出了每种算法通过有线或无线媒介进行安全通信所必需的局限性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Comprehensive Analysis Between Popular Symmetric Encryption Algorithms
In today’s world, data is termed as the new gold. The need for providing security to the data stored on local storage or at a remote location is a must. Various methods and algorithms are used for securing data one of which is using symmetric key cryptography. It is an encryption technique which uses a single key for the encryption and decryption process. This paper provides an extensive literature survey and puts forth a comparative analysis of the existing symmetric cryptography algorithms (Caesar, Vigenère, Data Encryption Standard, Triple Data Encryption Standard, Extended Data Encryption Standard, Rijndael, Twofish, Blowfish, Modified Blowfish) based on their architecture, flexibility, reliability, security and also states the limitations for each that are essential for secure communication through a wired or wireless medium.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信