Authors :
Girija Rani Suthoju; M. Suresh babu
Volume/Issue :
Volume 7 - 2022, Issue 11 - November
Google Scholar :
https://bit.ly/3IIfn9N
Scribd :
https://bit.ly/3FTnZe6
DOI :
https://doi.org/10.5281/zenodo.7478875
Abstract :
In secret key cryptography, a single key is used
for both encryption and decryption. It achieves privacy
and confidentiality. In this, sender sends the cipher text
by encrypting the plain text with a secret key and receiver
decrypts the cipher text by using same secret key to
generate original plain text. The secret key must be
shared between two authorized users secretly to apply at
both the ends for encrypting and decrypting. Major
challenge of secret key cryptography is the key sharing
i.e., distribution of secret key to the sender and the
receiver. This paper discusses the symmetric key
cryptographic algorithms and evaluates step by step
procedure of the algorithms with respect to the key bit
size.
Keywords :
Cryptography, Security, Symmetric Key, Cryptosystems, Plain Text, Cipher Text, Encryption, Decryption, Symmetric Algorithms,
In secret key cryptography, a single key is used
for both encryption and decryption. It achieves privacy
and confidentiality. In this, sender sends the cipher text
by encrypting the plain text with a secret key and receiver
decrypts the cipher text by using same secret key to
generate original plain text. The secret key must be
shared between two authorized users secretly to apply at
both the ends for encrypting and decrypting. Major
challenge of secret key cryptography is the key sharing
i.e., distribution of secret key to the sender and the
receiver. This paper discusses the symmetric key
cryptographic algorithms and evaluates step by step
procedure of the algorithms with respect to the key bit
size.
Keywords :
Cryptography, Security, Symmetric Key, Cryptosystems, Plain Text, Cipher Text, Encryption, Decryption, Symmetric Algorithms,