Literature Review of Stream Cipher Techniques

Rojasree. V; Dr. J. Gnana Jayanthi1

1

Publication Date: 2024/02/19

Abstract: Nowadays data plays a very important role in all the business and corporate industries. It has become necessary to secure the data. Many methodologies are followed in order to keep the confidentiality, integrity and availability of valuable data. Here in this survey we consider the Symmetric cryptography algorithms and their reviews, innovations done in the perspective of multiple authors. The survey includes the analysis of the design architecture, code flexibility, system reliability, information and data security and also the limitations of the chosen symmetric cryptography through any medium of communication.

Keywords: Stream cipher, DES, AES, EDES, Triple DES, Blowfish, Two fish.

DOI: https://doi.org/10.5281/zenodo.10677583

PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT24FEB659.pdf

REFERENCES

No References Available