Cryptography - A Technical Review

Authors

  • Shobha Bhatt  Ambedkar Institute of Advanced Communication Technologies and Research, Delhi, India

Keywords:

Cryptography, Symmetric , Asymmetric, Digital Signature, Hash Function, Random Number

Abstract

This paper presents a technical review on cryptography. The paper starts with different goals of security. Modern cryptography techniques such as symmetric key, asymmetric key were discussed. The hash function and digital signature were explored. A comparative list of different methods for implementation of cryptosystem was presented with merits and demerits. For the deep understanding of cryptography, important concepts which are widely used were summarized. Further essential subset of knowledge required for cryptography described . As random numbers play very important role in cryptography. Use of random numbers in cryptography explained. A modest effort has been made to cover maximum important aspects related to cryptography. Finally studies were concluded with the importance of cryptography and related issues. This research work will definitely help new researchers to understand various concepts of cryptography.

References

  1. Mansoor Ebrahim et.all: Symmetric Algorithm Survey: A comparative Analysis, International Journal of Computer Application (IJCA) Volume 61 no. 20, January (2013)
  2. Saranayak et.al., "A Review on Symmetric Key Encryption Technology uses in Cryptography ", International Journal of Science,: Engineering and Technology and Research (IJSETR), Volume 3, Issue 3, March( 2014)
  3. Manoj Kumar Pandey, et.all.,: "Survey Paper: Crytography The art of Hiding Information", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278-1323, Volume 2, Issue 12, December 2013.
  4. William Stalling: Cryptography and Network Security: Principles and Practices", PHI Learning Private Limited, Fourth Edition (2009)
  5. Christ of Paar, JanPelzl, amd Bartpreneel: "Understanding Cryptography: A Text book for student and Practitioners", Springer, (2010).
  6. Ross J. Anderson,: "Why Cryptosystems Fail" Communications of the ACM, New York, USA, pp. 32-40, (1994.)
  7. Bruce Schneier et al.,: "A Twofish Retreat:Related-Key Attacks Against Reduced-Round Twofish", Twofish Technical Report #6, February 14, 2000.
  8. Frank Lin, Crypto: graphic's past, present and future role in society, Dec (2010.)
  9. Daeman J Rijmen v: "The Rijandael block cipher", AES Proposal ,Belgica (1999)
  10. Carolyn Burwick et all: The MARS Encryption Algoritmm August(1999)
  11. Ronald L Rivest : The security of the RC6 Block Cipher, August(1998)
  12. Dharitri Talukdar: Study on International Journal of Applied Research( 2015)
  13. Bruce Schneier,: "A self-Study Course in Block-Cipher Cryptanalysis
  14. Bruce Schneier TwoFish, http://www.counterpane.com/twofish
  15. Burke, Jerome, John McDonald, and Todd Austin. "Architectural support for fast symmetric-key cryptography." ACM SIGARCH Computer Architecture News 28.5 (2000): 178-189
  16. Sarris, Paraskevas, Lewis Mackenzie, and Soumyadeb Chowdhury. Novel Authentication Scheme for Online Transactions ." Proceedings of the 7th International Conference on Security of Information and Networks. ACM , 2014.
  17. Forouzan, Behrouz A., and Debdeep Mukhopadhyay," Cryptography and Network Security (Sie)." McGraw-Hill Education, 2011
  18. https://en.wikipedia.org/wiki/Random_number_generation accessed on 6/08/17
  19. http://www.youdzone.com/signature.html last accessed on 5/08/17
  20. Panda, S. N. "A proportional analysis on cryptography techniques, functions and relative performance issues." Journal of Global Research in Computer Science 2.6 (2011): 130-136.
  21. http://www.ccs.neu.edu/home/riccardo/courses/csg252-fa06/lecture2.pdf(accessed on 6/08/17)
  22. McDonald, Nicholas G.. "Past, Present, and Future Methods of Cryptography and Data Encryption." (2009).

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Shobha Bhatt, " Cryptography - A Technical Review, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.518-523, July-August-2017.