@incollection{, 48DEFBB0179EF6622D4CE997C190382E , author={{Sangapu VenkataAppaji} and {GRIET affiliated to JNTUH}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1421930 } @book{b0, , title={{Cryptography and Network Security: Principles and Practice}} , author={{ SWilliam }} , year={1999} , publisher={Prentice-Hall, Inc} , note={2nd edition} } @book{b1, , title={{A Brief History of Cryptography}} , author={{ SHebert }} , note={an article available at} } @book{b2, , title={{Computer and Network security}} , author={{ AtulKahate }} } @book{b3, , title={{An Overview of Cryptography}} , author={{ KGary }} , note={an article available at} } @incollection{b4, , title={{A Survey on Symmetric Key Encryption Algorithms}} , author={{ ESurya } and { CDivya }} , journal={{International Journal of Computer Science & Communication Networks}} 2 4 } @book{b5, , title={{A Brief History Of Cryptography}} , author={{ TonyMDamico }} , note={an article available at} } @book{b6, , title={{Cryptography}} } @book{b7, , title={{Foundations of cryptography: basic tools}} , author={{ OdedGoldreich }} , year={2001} } @incollection{b8, , title={{An analysis of the CAST-256 cipher}} , author={{ CAdams }} , journal={{Electrical and Computer Engineering}} , year={1999} } @incollection{b9, , title={{}} , journal={{IEEE Canadian Conference on}} 1 , year={1999} , publisher={IEEE} } @incollection{b10, , title={{High efficiency counter mode security architecture via prediction and precomputation}} , author={{ WeidongShi }} , journal={{ACMSIGARCH Computer Architecture}} 33 , year={2005} } @incollection{b11, , title={{FPGA implementation of the" pyramids" block cipher}} , author={{ AbdullahAlkalbany } and { HusseinAhmad } and { AlHassan } and { MagdySaeb }} , booktitle={{SOC Conference}} , year={2005. 2005} } @incollection{b12, , title={{A block cipher based on a suitable use of the chaotic standard map}} , author={{ ShiguoLian } and { JinshengSun } and { ZhiquanWang }} , journal={{Chaos, Solitons & Fractals}} 26 , year={2005} } @incollection{b13, , title={{A Neural Key Generator for a Public Block Cipher}} , author={{ AnaGuerreiro } and { GMaria } and { CarlosPaz De Araujo }} , journal={{Neural Networks}} , year={2006. 2006} , publisher={IEEE} , note={SBRN'06. Ninth Brazilian Symposium on} } @incollection{b14, , title={{Assessing the Security of Key Length}} , author={{ IainDevlin } and { AlanPurvis }} , journal={{Trivium633}} 19 26 , year={2007} } @incollection{b15, , title={{}} , author={{ Ayushi }} , journal={{A Symmetric Key Cryptographic Algorithm, IJCA}} 1 , year={2010} } @incollection{b16, , title={{A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication}} , author={{ WulingRen } and { ZhiqianMiao }} , booktitle={{Modeling, Simulation and Visualization Methods (WMSVM), 2010 Second International Conference on}} , publisher={IEEE} , year={2010} } @incollection{b17, , title={{A unified block and stream cipher based file encryption}} , author={{ GManikandan } and { GKrishnan } and { NSairam }} , journal={{Journal of Global Research in Computer}} 2 , year={2011} } @incollection{b18, , title={{An integrated block and stream cipher approach for key enhancement}} , author={{ GManikandan }} , journal={{Journal of Theoretical and applied information Technology}} 28 , year={2011} } @incollection{b19, , title={{A Novel Approach for Data Security Enhancement Using Multi Level Encryption Scheme}} , author={{ SairamNatarajan } and { AnGanesan } and { KrishnanGanesan }} , journal={{International Journal of Computer Science and Information Technologies}} 2 1 , year={2011} } @book{b20, , title={{A Hybrid Crypto System based on a new Circle-Symmetric key Algorithm and RSA with CRT Asymmetrickey Algorithm for E-commerce}} } @incollection{b21, , title={{}} , author={{ Applications }} , journal={{International Journal of Computer Applications}} , year={2011} } @incollection{b22, , title={{New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm}} , author={{ NeerajKhanna }} , booktitle={{Communication Systems and Network Technologies (CSNT), 2011 International Conference on}} , publisher={IEEE} , year={2011} } @book{b23, , title={{An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based Wireless Sensor Networks}} , author={{ ARGanesh }} , year={2011. 2011} , publisher={IEEE} , note={Recent Trends in Information Tech nology (ICRTIT} } @incollection{b24, , title={{Index-based symmetric DNA encryption algorithm}} , author={{ Yunpeng } and { Zhang }} , booktitle={{2011 4th International Congress on}} , publisher={IEEE} , year={2011} 5 } @incollection{b25, , title={{Index based symmetric block encryption}} , author={{ KSashank } and { BDineshReddy } and { S. RatanKumar }} , booktitle={{Emerging Trends and Applications in Computer Science (NCETACS), 2011 2nd National Conference on}} , publisher={IEEE} , year={2011} } @incollection{b26, , title={{Secure extensions of FPGA soft core processors for symmetric key cryptography}} , author={{ LubosGaspar }} , booktitle={{Reconfigurable Communicationcentric Systems-on-Chip (ReCoSoC)}} , year={2011. 2011} , note={6th International Workshop on. IEEE} } @book{b27, , title={{Alleviating the effect of the strict}} , author={{ MustafaMMatalgah } and { YWalid } and { AmerMZibideh } and { Magableh }} } @incollection{b28, , title={{Improving Security Using Refined 16 X 16 Playfair Cipher for Enhanced Advanced Encryption Standard (AES)}} , author={{ IbukunEweoya } and { OlawandeDaramola } and { NicholasOmoregbe }} , journal={{Covenant Journal of Informatics and Communication Technology (CJICT)}} 1 2 , year={2013} } @incollection{b29, , title={{Enhanced Amalgam Encryption Approach for Grid Security: A Review}} , author={{ KamalJyoti }} , journal={{International Journal}} 3 4 , year={2013} } @incollection{b30, , title={{KED-A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69}} , author={{ JanailinWarjri } and { ERaj }} , journal={{International Journal of Computer Network & Information Security}} 5 10 , year={2013} } @incollection{b31, , title={{An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security}} , author={{ KrishnaPandey } and { VikasKumar } and { SiteshRangari } and { Kumarsinha }} , journal={{International Journal of Computer Applications}} , year={2013} } @incollection{b32, , title={{Design of a New Block Cipher Algorithm}} , author={{ ObaidaAl-Hazaimeh } and { Mohammad Awad }} , journal={{Network and Complex Systems}} 3 , year={2013} } @incollection{b33, , title={{Parallelization of AES algorithm for disk encryption using CBC and ICBC modes}} , journal={{Computing}} , year={2013} } @book{b34, , title={{Fourth International Conference on Communications and Networking Technologies (ICCCNT)}} , year={2013} } @incollection{b35, , title={{A complete binary tree structure block cipher for realtime multimedia}} , author={{ NRadha Aathithan } and { MVenkatesulu }} , booktitle={{Science and Information Conference (SAI)}} , publisher={IEEE} , year={2013. 2013} } @incollection{b36, , title={{Enhancement of RC6 block cipher algorithm and comparison with RC5 & RC6}} , author={{ HarshVerma } and { Ravindra KumarKumar } and { Singh }} , booktitle={{Advance Computing Conference (IACC)}} , year={2013. 2013} }