期刊名称:International Journal of Engineering and Computer Science
印刷版ISSN:2319-7242
出版年度:2014
卷号:3
期号:12
页码:9426-9429
出版社:IJECS
摘要:The paper is a short discussion on one of the most important encryption technique ever since it was deduced,this technique utilizes the symmetric key algorithm of Network Security. The symmetric key algorithm is analgorithmwhich makes utilization two keys a public key and a private key so as to limit the data access andthus maintain the much needed secrecy of data.In symmetric key encryption algorithm the private key is thesecret key as it rests with the sender and receiver only, this private key is responsible for the secrecy of data.Before we move onto detailed understanding of the algorithm it is necessary to know where is it beingimplemented or where you will get to see it and the answer to this question is network devices such asmodem, routers, bridges, gateway, repeater hubs, and switches and any other device which involves transferof data that is needed to be kept secret during its transmission to receiver