A Study on Cryptographic Techniques
DOI:
https://doi.org/10.32628/CSEIT206453Keywords:
Cryptography, Symmetric key, Asymmetric key, Encryption, DecryptionAbstract
In current scenario, to store data securely on online is a tedious task as a result proper security over the network. Cryptography is a technique that masks the data over the channel of communication. Hiding the data to outsiders is an art. As the technology grows day by day, the need for data security over the channel of communication is greatly increased. Several cryptographic schemes are used for secure communication. The cryptographic technique and various algorithms are used to ensure the application has the necessary security. Cryptography is the science of both encryption and decryption. This paper describes all of the cryptographic techniques in detail.
References
- Shivani Sharma, Yash Gupta“ Study on Cryptography and Techniques” , IJSRCSEIT, Vol.2, 2017.
- Preeti Singh, Praveen Shende, “Symmetric Key Cryptography: Current Trends”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.12, December- 2014.
- O.P Verma, Ritu Agarwal, Dhiraj Dafouti and Shobha Tyagi, “Peformance Analysis of Data Encryption Algorithms”, IEEE Delhi Technological University India, 2011.
- Himani Agrawal and Monisha Sharma, “Implementation and analysis of various symmetric cryptosystems”, Indian Journal of Science and Technology Vol. 3, No. 12, December 2010.
- Diaa Salama, Abdul Minaam, Hatem M.Abdual-Kader, and Mohiy Mohamed Hadhoud, “Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types”, International Journal of Network Security, PP.78-87, Sept. 2010.
- Tingyuan Nie and Teng Zhang, “ A Study of DES and Blowfish Encryption Algorithm”, IEEE, 2009.
- Russell K. Meyers and Ahmed H. Desoky, “An Implementation of the Blowfish Cryptosystem”, IEEE, 2008.
- Ms. Ritu Patidar1, Mrs. Rupali Bhartiya, “Modified RSA Cryptosystem Based on Offline Storage and Prime Number”, Vol.3, 2003.
- W. Stallings “Cryptography and network security”, vol.2, prentice hall, 2003
- E .Thambiraja ,G. Ramesh ,Dr. R. Umarani, “A Survey on Various Most Common Encryption Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277-128X.
- Harsh Kumar Verma, Ravindra Kumar Singh “Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms”, International Journal of Computer Applications, ISSN: 0975-8887.
- W. Stallings “Cryptography and network security”, Vol.4, prentice hall.
- Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani, “New Comparative Study Between DES, 3DES and AES within Nine Factors”, Journal Of Computing, ISSN 2151-9617.
- Mohit Marwaha, Rajeev Bedi, Amritpal Singh, Tejinder Singh, “Comparative Analysis of Cryptographic Algorithms”, International Journal of Advanced Engineering Technology, EISSN 0976-3945.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.