A Review On Securing Distributed Systems Using Symmetric Key Cryptography

Reading time: 2 minute
...

📝 Original Info

  • Title: A Review On Securing Distributed Systems Using Symmetric Key Cryptography
  • ArXiv ID: 1303.0351
  • Date: 2013-03-05
  • Authors: Researchers from original ArXiv paper

📝 Abstract

This review is aimed to evaluate the importance of Symmetric Key Cryptography for Security in Distributed Systems. Businesses around the world as well as research and other such areas rely heavily on distributed systems these days. Hence, security is also a major concern due to the openness of the system. Out of the various available security measures, we, in this paper, concentrate in general on the symmetric key cryptographic technique. We review two widely used and popular symmetric key cryptographic algorithms, viz. DES and AES. These two algorithms are evaluated on the parameters such as key size, block size, number of iterations, etc.

💡 Deep Analysis

Deep Dive into A Review On Securing Distributed Systems Using Symmetric Key Cryptography.

This review is aimed to evaluate the importance of Symmetric Key Cryptography for Security in Distributed Systems. Businesses around the world as well as research and other such areas rely heavily on distributed systems these days. Hence, security is also a major concern due to the openness of the system. Out of the various available security measures, we, in this paper, concentrate in general on the symmetric key cryptographic technique. We review two widely used and popular symmetric key cryptographic algorithms, viz. DES and AES. These two algorithms are evaluated on the parameters such as key size, block size, number of iterations, etc.

📄 Full Content

This review is aimed to evaluate the importance of Symmetric Key Cryptography for Security in Distributed Systems. Businesses around the world as well as research and other such areas rely heavily on distributed systems these days. Hence, security is also a major concern due to the openness of the system. Out of the various available security measures, we, in this paper, concentrate in general on the symmetric key cryptographic technique. We review two widely used and popular symmetric key cryptographic algorithms, viz. DES and AES. These two algorithms are evaluated on the parameters such as key size, block size, number of iterations, etc.

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut