Fundamentals of symmetric cryptography

16Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It is widely recognized that data security will play a central role not only in the design of future IT systems, but also in all kind of systems in which electronic data are exchanged. Cryptology is the main tool to realize data security. Cryptographic primitives will not only secure the data communication, but will provide safety and reliability of the given system. The latter is sometimes far more important for certain applications which involve automated control based on the data communication between different devices. Cryptology provides two different kinds of algorithms, namely symmetric and asymmetric (public-key) algorithms. This chapter gives an introduction to symmetric key cryptography and its subgroups - block ciphers and stream ciphers. We also provide short descriptions of the most commonly used algorithms in industry: DES and AES. We will focus on their special properties from an implementation point of view. Major concentration will be on software and hardware implementations of DES, 3-DES, AES and different modes of operations of block ciphers so that they can be used also as stream ciphers. © 2006 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Kumar, S., & Wollinger, T. (2006). Fundamentals of symmetric cryptography. In Embedded Security in Cars: Securing Current and Future Automotive IT Applications (pp. 125–143). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-28428-1_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free