Author:
Weissbaum François,Lugrin Thomas
Abstract
AbstractSymmetric encryption is the most common method to guarantee the confidentiality of a message or information. Encryption is a cryptographic process that makes it impossible for anyone who needs the decryption key to gain knowledge of plaintext. It is called symmetric when it uses the same key for encryption and decryption. The required key length for symmetric encryption must be at least 256 bits to guarantee sufficient protection against brute force attacks and the possible arrival of quantum computers. To conclude, well-established cryptographic libraries implementing standard algorithms should be preferred over homemade implementation.
Publisher
Springer Nature Switzerland
Reference7 articles.
1. Morris J. Dworkin. Recommendation for Block Cipher Modes of Operation: Methods and Techniques. Technical Report SP 800-38A, National Institute of Standards and Technology, December 2001.
2. Morris J. Dworkin. Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode. Technical Report SP 800-38A Addendum, National Institute of Standards and Technology, October 2010.
3. Mihir Bellare, Phillip Rogaway, and David Wagner. The EAX mode of operation. In International Workshop on Fast Software Encryption, pages 389–407. Springer, 2004.
4. Morris J. Dworkin. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. Technical Report SP 800-38D, National Institute of Standards and Technology, November 2007.
5. Morris J. Dworkin, Elaine B. Barker, James R. Nechvatal, James Foti, Lawrence E. Bassham, E. Roback, and James F. Dray Jr. Advanced Encryption Standard (AES). Technical report, National Institute of Standards and Technology, November 2001.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Employing Cryptographic Techniques for Data Security and Privacy Preservation;Transactions on Computer Science and Intelligent Systems Research;2024-08-12