Volume 2, Issue 3, May 2017, Page: 31-34
Hybrid Symmetric Volatile Encryption Algorithm Using Array
Mostafa Al-Romi, Department of Computer Science and Information System, AlMa'arfa Colleges of Science and Technology, Riyadh, Kingdom Saudi Arabia
Raid Al-Malki, Department of Computer Science and Information System, AlMa'arfa Colleges of Science and Technology, Riyadh, Kingdom Saudi Arabia
Received: May 11, 2017;       Accepted: May 24, 2017;       Published: Jul. 7, 2017
DOI: 10.11648/j.mcs.20170203.12      View  2262      Downloads  102
This paper demonstrates the symmetric key algorithm and describes how this algorithm works. Also, discuss the most common challenges that facing this cryptosystem and how to solve these aspects, and discuss two major kinds of attackers, also discuss some prior works that related with Symmetric Key Algorithm, also present the proposed solution.
Symmetric Key, A Public Key, Cryptosystem, Double Key, Asymmetric Key
To cite this article
Mostafa Al-Romi, Raid Al-Malki, Hybrid Symmetric Volatile Encryption Algorithm Using Array, Mathematics and Computer Science. Vol. 2, No. 3, 2017, pp. 31-34. doi: 10.11648/j.mcs.20170203.12
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Saranya, K., R. Mohanapriya, and J. Udhayan, A review on symmetric key encryption techniques in cryptography. International Journal of Science, Engineering and Technology Research, 2014. 3 (3): p. 539-544.
Rejani, R. and D. Krishnan, Study of symmetric key cryptography algorithms. International Journal of Computer Techniques, 2015. 2 (2): p. 45-50.
Chandramathi, S., et al., An overview of visual cryptography. International Journal of Computational Intelligence Techniques, ISSN, 2010: p. 0976-0466.
Al-Vahed, A. and H. Sahhavi, An overview of modern cryptography. World Applied Programming, 2011. 1 (1): p. 3-8.
Serjantov, A. and P. Sewell. Passive attack analysis for connection-based anonymity systems. in European Symposium on Research in Computer Security. 2003. Springer.
Gilbert, H., M. Robshaw, and H. Sibert, Active attack against HB/sup+: a provably secure lightweight authentication protocol. Electronics Letters, 2005. 41 (21): p. 1169-1170.
Wu, Q., et al. Asymmetric group key agreement. in Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2009. Springer.
Surya, E. and C. Diviya, A Survey on Symmetric Key Encryption Algorithms. International Journal of Computer Science & Communication Networks, 2012. 2 (4): p. 475-477.
Chan, A.-F. Symmetric-key homomorphic encryption for encrypted data processing. in Communications, 2009. ICC'09. IEEE International Conference on. 2009. IEEE.
Agrawal, H. and M. Sharma, Implementation and analysis of various symmetric cryptosystems. Indian Journal of Science and Technology, 2010. 3 (12): p. 1173-1176.
Nath, A., S. Ghosh, and M.A. Mallick. Symmetric Key Cryptography Using Random Key Generator. in Security and Management. 2010.
Elbirt, A. J. and C. Paar, An instruction-level distributed processor for symmetric-key cryptography. IEEE Transactions on Parallel and distributed Systems, 2005. 16 (5): p. 468-480.
Burke, J., J. McDonald, and T. Austin, Architectural support for fast symmetric-key cryptography. ACM SIGARCH Computer Architecture News, 2000. 28 (5): p. 178-189.
Thakur, J. and N. Kumar, DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis. International journal of emerging technology and advanced engineering, 2011. 1 (2): p. 6-12.
Wang, H., et al. Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control. in Distributed Computing Systems, 2008. ICDCS'08. The 28th International Conference on. 2008. IEEE.
Browse journals by subject