[PDF][PDF] A comparative survey on symmetric key encryption techniques

M Agrawal, P Mishra - International journal on computer science and …, 2012 - Citeseer
Nowadays, the use of internet are growing increasingly across the world, security becomes
a prime concern of issue for the society. Earlier security was a major issue for military …

A novel construction of efficient substitution-boxes using cubic fractional transformation

AH Zahid, MJ Arshad, M Ahmad - Entropy, 2019 - mdpi.com
A symmetric block cipher employing a substitution–permutation duo is an effective technique
for the provision of information security. For substitution, modern block ciphers use one or …

An innovative design of substitution-boxes using cubic polynomial mapping

AH Zahid, MJ Arshad - Symmetry, 2019 - mdpi.com
In this paper, we propose to present a novel technique for designing cryptographically
strong substitution-boxes using cubic polynomial mapping. The proposed cubic polynomial …

Performance evaluation of cryptographic algorithms: DES and AES

AK Mandal, C Parakash, A Tiwari - 2012 IEEE Students' …, 2012 - ieeexplore.ieee.org
With the fast progression of digital data exchange in electronic way, information security is
becoming much more important in data storage and transmission. Cryptography has come …

DES and AES performance evaluation

B Bhat, AW Ali, A Gupta - International Conference on …, 2015 - ieeexplore.ieee.org
In these days use of digital data exchange is increasing day by day in every field.
Information security plays very important role in storing and transmitting the data. When we …

Security analysis of blowfish algorithm

A Alabaichi, F Ahmad… - 2013 Second International …, 2013 - ieeexplore.ieee.org
Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key
lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security …

[PDF][PDF] Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish

PC Mandal - Journal of Global Research in Computer Science, 2012 - Citeseer
Internet and networks applications are growing very fast. So the importance and the value of
the exchanged data over the internet are increasing. Information Security has been very …

A Hybrid Digital‐Signature and Zero‐Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

O Tayan, MN Kabir, YM Alginahi - The Scientific World Journal, 2014 - Wiley Online Library
This paper addresses the problems and threats associated with verification of integrity, proof
of authenticity, tamper detection, and copyright protection for digital‐text content. Such …

[PDF][PDF] A modified approach for symmetric key cryptography based on blowfish algorithm

M Agrawal, P Mishra - International Journal of Engineering and Advanced …, 2012 - Citeseer
The principal goal of designing any encryption algorithm is to hide the original message and
send the non readable text message to the receiver so that secret message communication …

[PDF][PDF] A survey on symmetric key encryption algorithms

E Surya, C Diviya - International Journal of Computer Science & …, 2012 - scholar.archive.org
Security is the most challenging aspects in the internet and network applications. Internet
and network applications are growing fast. So the importance and the value of the …