Cryptographic Techniques in Information Security

Authors(2) :-Ravi Kumar Choubey, Ahtisham Hashmi

This paper focuses on the role of cryptography in the information security system and discussed some of the techniques which are used in cryptography. Earlier, Cryptography mainly is used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the uses are limited. In the modern days, the Cryptography be expanded a lot in the area of communication, securing e-commerce etc. Cryptography is used to transmit the message confidentially where no any trouble can happen between transmission.

Authors and Affiliations

Ravi Kumar Choubey
School of Computing Science and Engineering, Galgotias University, Greater Noida, India
Ahtisham Hashmi
School of Computing Science and Engineering, Galgotias University, Greater Noida, India

Cryptography, security, cryptanalysis, cryptosystem, cipher.

  1. Mr. Vinod Saroha, Suman Mor, Anurag Dagar "Enhancing Security of Caesar Cipher by Double Columnar Transposition Method" International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 2, Issue 10, 2012.
  2. M. S. Hwang and C. Y. Liu, "Authenticated encryption schemes: current status and key issues," International Journal of Network Security, vol. 1, no. 2, pp. 61-73, 2005.
  3. Bobby Jasuja and Abhishek Pandya-Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding"
  4. H. Kruse and A. Mukherjee. - "Data Compression Using Text Encryption", Proc. Data Compression Conference, IEEE Computer Society Press, 1997.
  5. Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed and Ahmed M Mahfouz -"Hybrid Compression Encryption Technique for Securing SMS", International Journal of Computer Science and Security (IJCSS), Volume (3): Issue(6)
  6. Dr.Mukesh Sharma and Smiley Gandhi- "Compression and Encryption: An Integrated Approach" International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 5, July – 2012.
  7. V. Kavitha and K. S Easwarakumar,"Enhancing Privacy in Arithmetic Coding" ICGSTAIML journal, Volume 8, Issue I,2008
  8. Dr. V. K. Govindan and B. S. Shajeemohan -"An intelligent text data encryption and compression for high speed and secure data transmission over internet"
  9. Akash Kumar Mandal, Chandra Parakash, Department of Electronics & Telecommunication CSIT, Durg, Chhattisgarh, India.Mrs. Archana Tiwari Department of Electronics & Instrumentation CSIT, Durg, Chhattisgarh, India,"Performance Evaluation of Cryptographic Algorithms: DES and AES", 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science.
  10. Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications (Kindle ed.). Indianapolis, IN: Wiley Publishing.

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 854-859
Manuscript Number : CSEIT1831159
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Ravi Kumar Choubey, Ahtisham Hashmi, "Cryptographic Techniques in Information Security", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.854-859, January-February-2018.
Journal URL :

Article Preview

Follow Us

Contact Us