Cryptographic Techniques in Information Security

Authors

  • Ravi Kumar Choubey  School of Computing Science and Engineering, Galgotias University, Greater Noida, India
  • Ahtisham Hashmi  School of Computing Science and Engineering, Galgotias University, Greater Noida, India

Keywords:

Cryptography, security, cryptanalysis, cryptosystem, cipher.

Abstract

This paper focuses on the role of cryptography in the information security system and discussed some of the techniques which are used in cryptography. Earlier, Cryptography mainly is used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the uses are limited. In the modern days, the Cryptography be expanded a lot in the area of communication, securing e-commerce etc. Cryptography is used to transmit the message confidentially where no any trouble can happen between transmission.

References

  1. Mr. Vinod Saroha, Suman Mor, Anurag Dagar "Enhancing Security of Caesar Cipher by Double Columnar Transposition Method" International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 2, Issue 10, 2012.
  2. M. S. Hwang and C. Y. Liu, "Authenticated encryption schemes: current status and key issues," International Journal of Network Security, vol. 1, no. 2, pp. 61-73, 2005.
  3. Bobby Jasuja and Abhishek Pandya-Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding"
  4. H. Kruse and A. Mukherjee. - "Data Compression Using Text Encryption", Proc. Data Compression Conference, IEEE Computer Society Press, 1997.
  5. Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed and Ahmed M Mahfouz -"Hybrid Compression Encryption Technique for Securing SMS", International Journal of Computer Science and Security (IJCSS), Volume (3): Issue(6)
  6. Dr.Mukesh Sharma and Smiley Gandhi- "Compression and Encryption: An Integrated Approach" International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 5, July – 2012.
  7. V. Kavitha and K. S Easwarakumar,"Enhancing Privacy in Arithmetic Coding" ICGSTAIML journal, Volume 8, Issue I,2008
  8. Dr. V. K. Govindan and B. S. Shajeemohan -"An intelligent text data encryption and compression for high speed and secure data transmission over internet"
  9. Akash Kumar Mandal, Chandra Parakash, Department of Electronics & Telecommunication CSIT, Durg, Chhattisgarh, India.Mrs. Archana Tiwari Department of Electronics & Instrumentation CSIT, Durg, Chhattisgarh, India,"Performance Evaluation of Cryptographic Algorithms: DES and AES", 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science.
  10. Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications (Kindle ed.). Indianapolis, IN: Wiley Publishing.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Ravi Kumar Choubey, Ahtisham Hashmi, " Cryptographic Techniques in Information Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.854-859, January-February-2018.