Mathematics and Computer Science

| Peer-Reviewed |

Hybrid Symmetric Volatile Encryption Algorithm Using Array

Received: 11 May 2017    Accepted: 24 May 2017    Published: 07 July 2017
Views:       Downloads:

Share This Article

Abstract

This paper demonstrates the symmetric key algorithm and describes how this algorithm works. Also, discuss the most common challenges that facing this cryptosystem and how to solve these aspects, and discuss two major kinds of attackers, also discuss some prior works that related with Symmetric Key Algorithm, also present the proposed solution.

DOI 10.11648/j.mcs.20170203.12
Published in Mathematics and Computer Science (Volume 2, Issue 3, May 2017)
Page(s) 31-34
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Symmetric Key, A Public Key, Cryptosystem, Double Key, Asymmetric Key

References
[1] Saranya, K., R. Mohanapriya, and J. Udhayan, A review on symmetric key encryption techniques in cryptography. International Journal of Science, Engineering and Technology Research, 2014. 3 (3): p. 539-544.
[2] Rejani, R. and D. Krishnan, Study of symmetric key cryptography algorithms. International Journal of Computer Techniques, 2015. 2 (2): p. 45-50.
[3] Chandramathi, S., et al., An overview of visual cryptography. International Journal of Computational Intelligence Techniques, ISSN, 2010: p. 0976-0466.
[4] Al-Vahed, A. and H. Sahhavi, An overview of modern cryptography. World Applied Programming, 2011. 1 (1): p. 3-8.
[5] Serjantov, A. and P. Sewell. Passive attack analysis for connection-based anonymity systems. in European Symposium on Research in Computer Security. 2003. Springer.
[6] Gilbert, H., M. Robshaw, and H. Sibert, Active attack against HB/sup+: a provably secure lightweight authentication protocol. Electronics Letters, 2005. 41 (21): p. 1169-1170.
[7] Wu, Q., et al. Asymmetric group key agreement. in Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2009. Springer.
[8] Surya, E. and C. Diviya, A Survey on Symmetric Key Encryption Algorithms. International Journal of Computer Science & Communication Networks, 2012. 2 (4): p. 475-477.
[9] Chan, A.-F. Symmetric-key homomorphic encryption for encrypted data processing. in Communications, 2009. ICC'09. IEEE International Conference on. 2009. IEEE.
[10] Agrawal, H. and M. Sharma, Implementation and analysis of various symmetric cryptosystems. Indian Journal of Science and Technology, 2010. 3 (12): p. 1173-1176.
[11] Nath, A., S. Ghosh, and M.A. Mallick. Symmetric Key Cryptography Using Random Key Generator. in Security and Management. 2010.
[12] Elbirt, A. J. and C. Paar, An instruction-level distributed processor for symmetric-key cryptography. IEEE Transactions on Parallel and distributed Systems, 2005. 16 (5): p. 468-480.
[13] Burke, J., J. McDonald, and T. Austin, Architectural support for fast symmetric-key cryptography. ACM SIGARCH Computer Architecture News, 2000. 28 (5): p. 178-189.
[14] Thakur, J. and N. Kumar, DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis. International journal of emerging technology and advanced engineering, 2011. 1 (2): p. 6-12.
[15] Wang, H., et al. Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control. in Distributed Computing Systems, 2008. ICDCS'08. The 28th International Conference on. 2008. IEEE.
Author Information
  • Department of Computer Science and Information System, AlMa'arfa Colleges of Science and Technology, Riyadh, Kingdom Saudi Arabia

  • Department of Computer Science and Information System, AlMa'arfa Colleges of Science and Technology, Riyadh, Kingdom Saudi Arabia

Cite This Article
  • APA Style

    Mostafa Al-Romi, Raid Al-Malki. (2017). Hybrid Symmetric Volatile Encryption Algorithm Using Array. Mathematics and Computer Science, 2(3), 31-34. https://doi.org/10.11648/j.mcs.20170203.12

    Copy | Download

    ACS Style

    Mostafa Al-Romi; Raid Al-Malki. Hybrid Symmetric Volatile Encryption Algorithm Using Array. Math. Comput. Sci. 2017, 2(3), 31-34. doi: 10.11648/j.mcs.20170203.12

    Copy | Download

    AMA Style

    Mostafa Al-Romi, Raid Al-Malki. Hybrid Symmetric Volatile Encryption Algorithm Using Array. Math Comput Sci. 2017;2(3):31-34. doi: 10.11648/j.mcs.20170203.12

    Copy | Download

  • @article{10.11648/j.mcs.20170203.12,
      author = {Mostafa Al-Romi and Raid Al-Malki},
      title = {Hybrid Symmetric Volatile Encryption Algorithm Using Array},
      journal = {Mathematics and Computer Science},
      volume = {2},
      number = {3},
      pages = {31-34},
      doi = {10.11648/j.mcs.20170203.12},
      url = {https://doi.org/10.11648/j.mcs.20170203.12},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.mcs.20170203.12},
      abstract = {This paper demonstrates the symmetric key algorithm and describes how this algorithm works. Also, discuss the most common challenges that facing this cryptosystem and how to solve these aspects, and discuss two major kinds of attackers, also discuss some prior works that related with Symmetric Key Algorithm, also present the proposed solution.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Hybrid Symmetric Volatile Encryption Algorithm Using Array
    AU  - Mostafa Al-Romi
    AU  - Raid Al-Malki
    Y1  - 2017/07/07
    PY  - 2017
    N1  - https://doi.org/10.11648/j.mcs.20170203.12
    DO  - 10.11648/j.mcs.20170203.12
    T2  - Mathematics and Computer Science
    JF  - Mathematics and Computer Science
    JO  - Mathematics and Computer Science
    SP  - 31
    EP  - 34
    PB  - Science Publishing Group
    SN  - 2575-6028
    UR  - https://doi.org/10.11648/j.mcs.20170203.12
    AB  - This paper demonstrates the symmetric key algorithm and describes how this algorithm works. Also, discuss the most common challenges that facing this cryptosystem and how to solve these aspects, and discuss two major kinds of attackers, also discuss some prior works that related with Symmetric Key Algorithm, also present the proposed solution.
    VL  - 2
    IS  - 3
    ER  - 

    Copy | Download

  • Sections