Study on Cryptography and Techniques

Authors(2) :-Shivani Sharma, Yash Gupta

In today's information age, communication play a very important role which help in growth of new technologies. So security is an essential parameter to be considered. A mechanism is therefore needed to secure the information that is sent. The process of transforming the original information into an unreadable format is known as encryption. The process of again converting the unreadable format in to the original information is known as decryption. The study of both encryption and decryption is known as cryptography. This paper focuses on analysing different types of cryptography, concept of encryption and decryption, a brief introduction to cryptography techniques. If we are taking about security of information then following services come in mind i.e. Confidentiality (privacy of information), Authentication, Integrity (has not been altered) .This paper provides a detailed description of all these cryptography techniques and a public key cryptography algorithm RSA.

Authors and Affiliations

Shivani Sharma
Tata Consultancy Services, Noida, Uttar Pradesh, India
Yash Gupta
Tata Consultancy Services, Noida, Uttar Pradesh, India

Information, cryptography, symmetric key, asymmetric key, Cipher text, Plain text, RSA Algorithm

  1. Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta, Asoke Nath “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm” published in 2011 International Conference on Communication Systems and Network Technologies, 978-0-7695-4437-3/11 $26.00 © 2011 IEEE.
  2. Symmetric key cryptography using random key generator, A.Nath, S.Ghosh, M.A.Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12-15 July,2010, Vol-2,P-239-244.
  3. Data Hiding and Retrieval, A.Nath, S.Das, A.Chakrabarti, Proceedings of IEEE International conference on Computer Intelligence and Computer Network held at Bhopal from 26-28 Nov, 2010.
  4. Neal Koblitz “A Course in Number Theory and Cryptography” Second Edition Published by Springer-Verlag.
  5. T Morkel, JHP Eloff “ ENCRYPTION TECHNIQUES: A TIMELINE APPROACH” published in Information and Computer Security Architecture (ICSA) Research Group proceeding. 
  6. Text book William Stallings, Data and Computer Communications, 6eWilliam 6e 2005.
  7. Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, M.A. Matin “Effect of Security Increment to Symmetric Data Encryption through AES Methodology” Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing 978-0-7695-3263-9/08 DOI 10.1109/SNPD.2008.101 IEEE 2008.
  8. Joan Daemen and Vincent Rijmen, AES submission document on Rijndael, Version 2, September 1999.

Publication Details

Published in : Volume 2 | Issue 1 | January-February 2017
Date of Publication : 2017-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 249-252
Manuscript Number : CSEIT172150
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Shivani Sharma, Yash Gupta , "Study on Cryptography and Techniques", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 1, pp.249-252, January-February-2017.
Journal URL : http://ijsrcseit.com/CSEIT172150

Article Preview

Follow Us

Contact Us