A Study on Cryptographic Techniques

Authors

  • Anjali Krishna A  PG Scholar, Department of CSE, Musaliar College of Engineering & Technology, Pathanamthitta, Kerala, India
  • Dr. L. C. Manikandan  Professor and HoD, Department of CSE, Musaliar College of Engineering & Technology, Pathanamthitta, Kerala, India

DOI:

https://doi.org/10.32628/CSEIT206453

Keywords:

Cryptography, Symmetric key, Asymmetric key, Encryption, Decryption

Abstract

In current scenario, to store data securely on online is a tedious task as a result proper security over the network. Cryptography is a technique that masks the data over the channel of communication. Hiding the data to outsiders is an art. As the technology grows day by day, the need for data security over the channel of communication is greatly increased. Several cryptographic schemes are used for secure communication. The cryptographic technique and various algorithms are used to ensure the application has the necessary security. Cryptography is the science of both encryption and decryption. This paper describes all of the cryptographic techniques in detail.

References

  1. Shivani Sharma, Yash Gupta“ Study on Cryptography and Techniques” , IJSRCSEIT, Vol.2, 2017.
  2. Preeti Singh, Praveen Shende, “Symmetric Key Cryptography: Current Trends”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.12, December- 2014.
  3. O.P Verma, Ritu Agarwal, Dhiraj Dafouti and Shobha Tyagi, “Peformance Analysis of Data Encryption Algorithms”, IEEE Delhi Technological University India, 2011.
  4. Himani Agrawal and Monisha Sharma, “Implementation and analysis of various symmetric cryptosystems”, Indian Journal of Science and Technology Vol. 3, No. 12, December 2010.
  5. Diaa Salama, Abdul Minaam, Hatem M.Abdual-Kader, and Mohiy Mohamed Hadhoud, “Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types”, International Journal of Network Security, PP.78-87, Sept. 2010.
  6. Tingyuan Nie and Teng Zhang, “ A Study of DES and Blowfish Encryption Algorithm”, IEEE, 2009.
  7. Russell K. Meyers and Ahmed H. Desoky, “An Implementation of the Blowfish Cryptosystem”, IEEE, 2008.
  8. Ms. Ritu Patidar1, Mrs. Rupali Bhartiya, “Modified RSA Cryptosystem Based on Offline Storage and Prime Number”, Vol.3, 2003.
  9. W. Stallings “Cryptography and network security”, vol.2, prentice hall, 2003
  10. E .Thambiraja ,G. Ramesh ,Dr. R. Umarani, “A Survey on Various Most Common Encryption Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277-128X.
  11. Harsh Kumar Verma, Ravindra Kumar Singh “Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms”, International Journal of Computer Applications, ISSN: 0975-8887.
  12. W. Stallings “Cryptography and network security”, Vol.4, prentice hall.
  13. Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani, “New Comparative Study Between DES, 3DES and AES within Nine Factors”, Journal Of Computing, ISSN 2151-9617.
  14. Mohit Marwaha, Rajeev Bedi, Amritpal Singh, Tejinder Singh, “Comparative Analysis of Cryptographic Algorithms”, International Journal of Advanced Engineering Technology, EISSN 0976-3945.

Downloads

Published

2020-08-30

Issue

Section

Research Articles

How to Cite

[1]
Anjali Krishna A, Dr. L. C. Manikandan, " A Study on Cryptographic Techniques" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 4, pp.321-327, July-August-2020. Available at doi : https://doi.org/10.32628/CSEIT206453