Publication Date: 2022/12/24
Abstract: In secret key cryptography, a single key is used for both encryption and decryption. It achieves privacy and confidentiality. In this, sender sends the cipher text by encrypting the plain text with a secret key and receiver decrypts the cipher text by using same secret key to generate original plain text. The secret key must be shared between two authorized users secretly to apply at both the ends for encrypting and decrypting. Major challenge of secret key cryptography is the key sharing i.e., distribution of secret key to the sender and the receiver. This paper discusses the symmetric key cryptographic algorithms and evaluates step by step procedure of the algorithms with respect to the key bit size.
Keywords: Cryptography, Security, Symmetric Key, Cryptosystems, Plain Text, Cipher Text, Encryption, Decryption, Symmetric Algorithms,
DOI: https://doi.org/10.5281/zenodo.7478875
PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT22NOV1431.pdf
REFERENCES