{"title":"流行对称加密算法的综合分析","authors":"Shiraz Saptarshi Ghosh, Harshwardhan Parmar, Prasham Shah, Krishna Samdani","doi":"10.1109/PUNECON.2018.8745324","DOIUrl":null,"url":null,"abstract":"In today’s world, data is termed as the new gold. The need for providing security to the data stored on local storage or at a remote location is a must. Various methods and algorithms are used for securing data one of which is using symmetric key cryptography. It is an encryption technique which uses a single key for the encryption and decryption process. This paper provides an extensive literature survey and puts forth a comparative analysis of the existing symmetric cryptography algorithms (Caesar, Vigenère, Data Encryption Standard, Triple Data Encryption Standard, Extended Data Encryption Standard, Rijndael, Twofish, Blowfish, Modified Blowfish) based on their architecture, flexibility, reliability, security and also states the limitations for each that are essential for secure communication through a wired or wireless medium.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A Comprehensive Analysis Between Popular Symmetric Encryption Algorithms\",\"authors\":\"Shiraz Saptarshi Ghosh, Harshwardhan Parmar, Prasham Shah, Krishna Samdani\",\"doi\":\"10.1109/PUNECON.2018.8745324\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today’s world, data is termed as the new gold. The need for providing security to the data stored on local storage or at a remote location is a must. Various methods and algorithms are used for securing data one of which is using symmetric key cryptography. It is an encryption technique which uses a single key for the encryption and decryption process. This paper provides an extensive literature survey and puts forth a comparative analysis of the existing symmetric cryptography algorithms (Caesar, Vigenère, Data Encryption Standard, Triple Data Encryption Standard, Extended Data Encryption Standard, Rijndael, Twofish, Blowfish, Modified Blowfish) based on their architecture, flexibility, reliability, security and also states the limitations for each that are essential for secure communication through a wired or wireless medium.\",\"PeriodicalId\":166677,\"journal\":{\"name\":\"2018 IEEE Punecon\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE Punecon\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PUNECON.2018.8745324\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Punecon","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PUNECON.2018.8745324","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comprehensive Analysis Between Popular Symmetric Encryption Algorithms
In today’s world, data is termed as the new gold. The need for providing security to the data stored on local storage or at a remote location is a must. Various methods and algorithms are used for securing data one of which is using symmetric key cryptography. It is an encryption technique which uses a single key for the encryption and decryption process. This paper provides an extensive literature survey and puts forth a comparative analysis of the existing symmetric cryptography algorithms (Caesar, Vigenère, Data Encryption Standard, Triple Data Encryption Standard, Extended Data Encryption Standard, Rijndael, Twofish, Blowfish, Modified Blowfish) based on their architecture, flexibility, reliability, security and also states the limitations for each that are essential for secure communication through a wired or wireless medium.