2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA) 2020
DOI: 10.1109/iceca49313.2020.9297547
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric Key Algorithm in Computer security: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…The result is XORed with K once more to generate the ciphertext. Each round function consists of AddConstants (AC), SubCells (SC), ShiftRows (SR), and MixColumnSerial (MC) operations, which compute a 4 × 4 matrix multiplication in GF(2 4 ). 32 rounds resemble the structure of AES [33].…”
Section: The Led Block Ciphermentioning
confidence: 99%
See 1 more Smart Citation
“…The result is XORed with K once more to generate the ciphertext. Each round function consists of AddConstants (AC), SubCells (SC), ShiftRows (SR), and MixColumnSerial (MC) operations, which compute a 4 × 4 matrix multiplication in GF(2 4 ). 32 rounds resemble the structure of AES [33].…”
Section: The Led Block Ciphermentioning
confidence: 99%
“…Thus, it is necessary to use current cryptography techniques to fend off security risks [1], [2]- [3]. In resource-constrained systems, conventional cryptography algorithms are extremely slow, complex, and energyintensive [4]- [5]. The use of low-cost computational algorithms is growing in popularity.…”
Section: Introductionmentioning
confidence: 99%
“…Conventional cryptography algorithms are slow, complicated, and energy-intensive when used with resource-constrained systems [5], [6]. The use of simple algorithms is growing in popularity.…”
Section: Introductionmentioning
confidence: 99%
“…Then, this unit will be encrypted. Some of the famous and dominant encryption algorithms that use symmetric key encryption are Digital Encryption Standard (DES), AES, RC4, and IDEA [3]. In the case of asymmetric key encryption, two keys are used to handle the encryption and the decryption processes.…”
Section: Introductionmentioning
confidence: 99%