Research Article

A Symmetric Key Cryptographic Algorithm

by  Ayushi
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Issue 15
Published: February 2010
Authors: Ayushi
10.5120/331-502
PDF

Ayushi . A Symmetric Key Cryptographic Algorithm. International Journal of Computer Applications. 1, 15 (February 2010), 1-4. DOI=10.5120/331-502

                        @article{ 10.5120/331-502,
                        author  = { Ayushi },
                        title   = { A Symmetric Key Cryptographic Algorithm },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 1 },
                        number  = { 15 },
                        pages   = { 1-4 },
                        doi     = { 10.5120/331-502 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A Ayushi
                        %T A Symmetric Key Cryptographic Algorithm%T 
                        %J International Journal of Computer Applications
                        %V 1
                        %N 15
                        %P 1-4
                        %R 10.5120/331-502
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Any communication in the language that you and I speak-that is the human language, takes the form of plain text or clear text. That is, a message in plain text can be understood by anybody knowing the language as long as the message is not codified in any manner. So, now we have to use coding scheme to ensure that information is hidden from anyone for whom it is not intended, even those who can see the coded data.

References
  • S. William, Cryptography and Network Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc., 1999 pp 23-50
  • Computer and Network security by ATUL KAHATE
  • Fundamentals of Computer Security, Springer publications "Basic Cryptographic Algorithms", an article available at www.itsc.state.md.us/oldsite/info/InternetSecurity/Crypto/CryptoIntro.htm#Algorithms
  • S. Hebert, "A Brief History of Cryptography", an article available at http://cybercrimes.net/aindex.html
  • "Introduction to Public-Key Cryptography", an article available at developer.netscape.com/docs/manuals/security/pkin/contents.htm
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cryptography Network security Symmetric Key

Powered by PhDFocusTM