Cryptographic Services to Enforce Secure Messaging and Data Storage


Authors : Girija Rani Suthoju; M. Suresh babu

Volume/Issue : Volume 7 - 2022, Issue 11 - November

Google Scholar : https://bit.ly/3IIfn9N

Scribd : https://bit.ly/3FTnZe6

DOI : https://doi.org/10.5281/zenodo.7478875

In secret key cryptography, a single key is used for both encryption and decryption. It achieves privacy and confidentiality. In this, sender sends the cipher text by encrypting the plain text with a secret key and receiver decrypts the cipher text by using same secret key to generate original plain text. The secret key must be shared between two authorized users secretly to apply at both the ends for encrypting and decrypting. Major challenge of secret key cryptography is the key sharing i.e., distribution of secret key to the sender and the receiver. This paper discusses the symmetric key cryptographic algorithms and evaluates step by step procedure of the algorithms with respect to the key bit size.

Keywords : Cryptography, Security, Symmetric Key, Cryptosystems, Plain Text, Cipher Text, Encryption, Decryption, Symmetric Algorithms,

CALL FOR PAPERS


Paper Submission Last Date
31 - March - 2024

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe