Information Security with Cryptography Symmetric Key Encryption Algorithms: A Survey

Anant Shankar Ellapalli*, S. Varadarajan**
*-** Department of Electronics and Communication Engineering, Sri Venkateswara University, Tirupati, Andhra Pradesh, India.
Periodicity:January - June'2022
DOI : https://doi.org/10.26634/jcs.11.1.18913

Abstract

In cryptography, data encryption turns ordinary information into an obfuscated code, and the information cannot be viewed without being decrypted. Thus, cryptography remains the main element of data protection. There are two kinds of cryptography, such as symmetric and asymmetric. There are many existing symmetric algorithms that are used to encrypt data, such as the Data Encryption Standard (DES), Triple Data Encryption Algorithm (TDEA), Enigmatic Diagonal Encryption Standard (EDES), Advanced Encryption Standard (AES), BLOWFISH, TWOFISH, Rivest Cipher 4 (RC4), Rivest Cipher 6 (RC6), which have been reviewed in this paper. It compares and tracks a summary of productive encryption calculations. The performance is compared with key size, space, time, security, and features of encryption methods.

Keywords

Cryptography, Symmetric, Asymmetric, DES, AES, BLOWFISH, TWOFISH, Encryption Algorithm.

How to Cite this Article?

Ellapalli, A. S., and Varadarajan, S. (2022). Information Security with Cryptography Symmetric Key Encryption Algorithms: A Survey. i-manager’s Journal on Communication Engineering and Systems, 11(1), 19-26. https://doi.org/10.26634/jcs.11.1.18913

References

[1]. Abood, O. G., & Guirguis, S. K. (2018). A survey on cryptography algorithms. International Journal of Scientific and Research Publications, 8(7), 495-516. http://dx.doi.org/10.29322/IJSRP.8.7.2018.p7978
[2]. Amalraj, A. J., & Jose, J. J. R. (2016). A survey paper on cryptography techniques. International Journal of Computer Science and mobile computing, 5(8), 55-59.
[3]. Dewangan, P. (2020). A review paper on network security and cryptography. International Journal of Science and Research (IJSR), 9(1).
[4]. Jeevalatha, E., & Murugan, S. S. (2018). Evolution of AES, blowfish and twofish encr yption algorithm. International Journal of Scientific & Engineering Research, 9(4), 115-118.
[5]. Kahate, A. (2008). Cryptography and Network Security, Tata McGraw-Hill Companies.
[6]. Khan, M., Hussain, S., & Imran, M. (2013). Performance evaluation of symmetric cryptography algorithms: A survey. International Journal of Information Technology and Electrical Engineering, 2(2), 1-8.
[7]. Koko, S. O. F. M., & Babiker, A. (2015). Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication. IOSR Journal of Computer Engineering (IOSR-JCE), 17(1), 62-69. https:// doi.org/10.9790/0661-17136269
[8]. Kumari, S. (2017). A research paper on cryptography encryption and compression techniques. International Journal of Engineering and Computer Science, 6(4), 20915-20919.
[9]. Mandal, A. K., Parakash, C., & Tiwari, A. (2012). Performance evaluation of cryptographic algorithms: DES and AES. In 2012, IEEE Students' Conference on Electrical, Electronics and Computer Science, 1-5. https://doi.org/10.1109/SCEECS.2012.6184991
[10]. Princy, P. (2015). A comparison of symmetric key algorithms DES, AES, Blowfish, RC4, RC6: A survey. International Journal of Computer Science & Engineering Technology (IJCSET), 6(5), 328-331
[11]. Sivakumar, R., Balakumar, B., & Pandeeswaran, V. A. (2018). A study of encryption algorithms (DES, 3DES and AES) for information security. International Research Journal of Engineering and Technology (IRJET), 5(4).
[12]. Sonia, R., & Harpreet, K. (2016). Technical survey on cr yptography algorithms for network security. International Journal of Advanced Research in Computer Science and Software Engineering, 4(9), 204-209.
[13]. Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A review paper on network security and cryptography. Advances in Computational Sciences and Technology, 10(5), 763-770.
[14]. Thambiraja, E., Ramesh, G., & Umarani, D. R. (2012). A survey on various most common encr yption techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 2(7), 226-233.
[15]. Verma, P., Shekhar, J., & Preety, A. A. (2015). A survey for per formance analysis various cr yptography techniques digital contents. International Journal of Computer Science and Mobile Computing, 4(1), 522-531.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.