scispace - formally typeset
Proceedings ArticleDOI

A survey on conventional encryption algorithms of Cryptography

Reads0
Chats0
TLDR
A comprehensive interpretation to research some of the most commonly used encryption algorithms in the domain of cryptography to identify as many of their weaknesses and vulnerabilities as possible and to identify the aspects of these weaknesses that can be avoided by correct implementation.
Abstract
This paper presents the results of a comprehensive interpretation to research some of the most commonly used encryption algorithms in the domain of cryptography firstly to identify as many of their weaknesses and vulnerabilities as possible, and secondly to identify the aspects of these weaknesses that can be avoided by correct implementation. Day by day the vulnerabilities are rapidly increasing on the Internet. A strong encryption algorithm is required to counter these vulnerabilities. In this paper, we provided the overview of existing conventional encryption algorithms and literature survey of these algorithms. This study extends to define a new secure conventional encryption algorithm in Cryptography. The algorithm takes data in intelligible form and converts it in to secure unintelligible form.

read more

Citations
More filters
Journal ArticleDOI

BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture

TL;DR: In this article, a blockchain-based fog IoT Microservice (BFIM) architecture is proposed for secure end device-based communication in a hierarchical tree-based overlay mesh architecture.
Journal Article

INTERNATIONAL DATA ENCRYPTION ALGORITHM (IDEA) â A TYPICAL ILLUSTRATION

TL;DR: This article tries to represent the existing IDEA algorithm in a different way, and shows how the encryption can be expressed in a simpler way.
Proceedings ArticleDOI

User Defined Encryption Procedure For IDEA Algorithm

TL;DR: The designing and implementation of IDEA algorithm, a block cipher that works with 64-bit plaintext block and ciphertext blocks and it has a 128-bit input key, is described.
Proceedings ArticleDOI

Secure Message Embedding in 3D Images

TL;DR: The proposed multiple layer message security scheme is proposed, utilizing 3D images and is shown to exhibit excellent traits, in terms of being reversible and its ability to carry out blind extraction of the data as well as withstanding geometrical attacks.
Journal ArticleDOI

Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

TL;DR: A comprehensive survey of elliptic curve cryptosystems can be found in this paper , where the authors claim that the adoption of EC methods in distributed computing and asynchronous networking provides significant benefits in distributed and interdependent networking.
References
More filters
Book ChapterDOI

Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)

TL;DR: Blowfish, a new secret-key block cipher, is proposed, a Feistel network, iterating a simple encryption function 16 times, which is very efficient on large microprocessors.
Journal ArticleDOI

Constructing Symmetric Ciphers Using the CAST Design Procedure

TL;DR: The CAST design procedure for constructing a family of DES-like Substitution-Permutation Network (SPN) cryptosystems is described in this paper, which appears to have good resistance to differential cryptanalysis, linear cryptanalysis and related-key cryptanalysis.
Journal Article

Symmetric Algorithm Survey: A Comparative Analysis

TL;DR: This paper presents a comprehensive comparative analysis of different existing cryptographic algorithms (symmetric) based on their Architecture, Scalability, Flexibility, Reliability, Security and Limitation that are essential for secure communication (Wired or Wireless).
Journal Article

Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES ,AES and Blowfish

TL;DR: A fair comparison between four most common and used symmetric key algorithms: DES, 3DES,AES and Blowfish is provided and shows that blowfish is more suitable than AES.
Journal Article

International data encryption algorithm (idea) - a typical illustration

TL;DR: The International Data Encryption Algorithm (IDEA) is one of the strongest secret-key block ciphers as discussed by the authors, and it can be expressed in a simpler way.
Related Papers (5)
Trending Questions (1)
What are the vulnerabilities of traditional encryption methods during processing of data ?

The paper aims to identify weaknesses and vulnerabilities of conventional encryption algorithms and propose a new secure encryption algorithm.