Proceedings of the International Conference on Sustainable Science and Technology for Tomorrow (SciTech 2024)

A Survey of Various Symmetric Encryption Methods

Authors
Dipali Deepak Mali1, *, Sahebrao Nivrutti Shinde2
1Department of Computer Science, MVP’s C.M.C.S. College, Nashik, Maharashtra, India
2MVP’s Arts, Commerce and Science College, Nandgaon, Nashik, Maharashtra, India
*Corresponding author. Email: mali.dipali@gmail.com
Corresponding Author
Dipali Deepak Mali
Available Online 23 October 2025.
DOI
10.2991/978-94-6463-876-9_22How to use a DOI?
Keywords
Advanced Encryption Standard (AES); Blowfish; Cryptography; Data Encryption Standard (DES)
Abstract

Day by day, the use of mobile devices and multimedia technologies is increasing widely. Hence, Information security is a challenging issue today. The transmission of sensitive data over communication channels requires fast and secure digital communication networks to achieve integrity and secrecy. It is necessary to keep the information safe from the various organization competitors or attacks. For secure data transmission, encryption is an important factor. Data encryption is the process of converting plain text into cipher text. Cryptography plays a vital role in the field of network security. Various encryption techniques are available, and suitable ones should be selected as per the requirements.

It is crucial to select the appropriate encryption method as per the specific requirements. In this paper, various encryption methods—such as Advanced Encryption Standard (AES), Blowfish, Data Encryption Standard (DES), Rivest Cypher 5 and Twofish are analyzed and studied. The results are concluded using various performance parameters, and brief and clear conclusions are drawn for each method. Key Objective of this research paper is: Comparison of various encryption techniques. Investigating various issues in audio encryption techniques.

Copyright
© 2025 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the International Conference on Sustainable Science and Technology for Tomorrow (SciTech 2024)
Series
Atlantis Advances in Applied Sciences
Publication Date
23 October 2025
ISBN
978-94-6463-876-9
ISSN
3091-4442
DOI
10.2991/978-94-6463-876-9_22How to use a DOI?
Copyright
© 2025 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Dipali Deepak Mali
AU  - Sahebrao Nivrutti Shinde
PY  - 2025
DA  - 2025/10/23
TI  - A Survey of Various Symmetric Encryption Methods
BT  - Proceedings of the International Conference on Sustainable Science and Technology for Tomorrow (SciTech 2024)
PB  - Atlantis Press
SP  - 294
EP  - 303
SN  - 3091-4442
UR  - https://doi.org/10.2991/978-94-6463-876-9_22
DO  - 10.2991/978-94-6463-876-9_22
ID  - Mali2025
ER  -