IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 6 - Issue 6, June 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Best Symmetric Key Encryption - A Review

[Full Text]

 

AUTHOR(S)

Shelveen Pandey, Mohammed Farik

 

KEYWORDS

AES, DES, Triple-DES, Symmetric Key Encryption, Quantum Computing

 

ABSTRACT

Advanced Encryption Standard (AES) is currently the leading standard for encryption which is currently used by the U.S. Government to protect sensitive data. The paper compares AES, DES, and 3DES encryptions and in light of current and future challenges.

 

REFERENCES

[1] Anja. (2017, February 9). Quantum Computers - a Threat for PKI? Retrieved May 25, 2017, from securosys: https://www.securosys.ch/quantum-computers-threat-pki

[2] Avast. (2017). Free Ransomware Decryption Tools. Retrieved May 02, 2017, from Avast: https://www.avast.com/ransomware-decryption-tools

[3] Beall, A. (2017, March 23). Inside the weird world of quantum computers. Retrieved May 24, 2017, from WIRED: http://www.wired.co.uk/article/quantum-computing-explained

[4] Dunkelberger, P. (2017). The Future of Encryption. PGP Corporation.

[5] NIST. (2001). ADVANCED ENCRYPTION STANDARD (AES). Gaithersburg: Federal Information Processing Standards Publication 197.

[6] NIST. (2017). Advanced Encryption Standard Algorithm Validation List. Retrieved April 30, 2017, from http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html

[7] NIST SP800-57 P1. R4. (2016). Recommendation for Key Management Part 1: General. National Institute of Standards and Technology. National Institute of Standards and Technology.

[8] NIST Special Publication 800-57, P. 3. (2015). Recommendation for Key Management. National Institute of Standards and Technology.

[9] Pearce, R. (2016, June 02). Bank’s investment in quantum computing. Retrieved May 24, 2017, from Computerworld: https://www.computerworld.com.au/article/600879/behind-commonwealth-bank-investment-quantum-computing/

[10] Smart, N. P., Rijmen, V., Warinschi, B., & Watson, G. (2013). Algorithms, Key Sizes and Parameters Report . Heraklion: European Union Agency for Network and Information Security Agency .

[11] Stallings, W. (2011). NETWORK SECURITY ESSENTIALS: APPLICATIONS AND STANDARDS (FOURTH ed.). (Michael, Ed.) Pearson Education, Inc.

[12] Wikipedia. (2017). AES implementations. Retrieved April 24, 2017, from Wikipedia: https://en.wikipedia.org/wiki/AES_implementations

[13] Beall, A. (2017, March 23). Inside the weird world of quantum computers. Retrieved May 24, 2017, from WIRED: http://www.wired.co.uk/article/quantum-computing-explained