Revelation of Cryptography
DOI:
https://doi.org/10.32628/CSEIT217233Keywords:
Cipher text, Encryption, Secret Message, Cryptographic Techniques, Secret Message, Cryptanalysis, Modern EncryptionAbstract
As the means of communications matured and developed so did the need of secret message keeping, as we discover new and more sophisticated cryptographic techniques are being developed to aid in securing the communications between sender and receiver. Some of cryptographers started to come up with new techniques to hide the data using new encryption methods while others came up with new techniques to break the said encryption methods and this led to many great evolutions in the communication sector, as the communications became digital from analog secret message keeping became far more important and led to the introduction of various protocols and frameworks to support their need of secret message keeping.
References
- Nicholas G. McDonald, Department of Electrical and Computer Engineering, University of Utah. “Past, Present, Future Methods of Cryptography and Data Encryption”, Utah, USA.
- Soumitra Bhattacharya. 2019. International Journal on Cryptography and Information Security (IJCIS), Vol. 9, No.1/2, June 2019,
- CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY Whitefield Diffie, Cryptography: Past, present and Future. Springer.
- https://www.tutorialspoint.com/cryptography/modern_cryptography.html
- https://www.semanticscholar.org/paper/Essay-15-Cryptography-Abrams-Podell/62a3f959c11b8209f191592216d74f67beba9ffd
- https://www.tutorialspoint.com/cryptography/origin_of_cryptography.html
- http://www.rsa.com/rsalabs/node.asp?id=2094
- Dan Boneh. The Theory and Application of Cryptology and Information Security. “Pairing-Based Cryptography: Past, Present, and Future”.
- https://economictimes.indiatimes.com/definition/cryptography
- https://www.csoonline.com/article/3583976/what-is-cryptography-how-algorithms-keep-information-secret-and-safe.html
- https://medium.com/@.Qubit/what-is-cryptography-a18423c82e47
- https://towardsdatascience.com/the-basics-of-cryptography-80c7906ba2f7
- http://cryptogramma.com/cryptogramma/How_it_works.html
- https://www.dcode.fr/caesar-cipher
- https://crypto.interactive-maths.com/vigenegravere-cipher.html
- https://www.sciencedirect.com/topics/computer-science/jefferson-diskJason Andress. Science Direct. The Basics of Information Security, 2011.
- https://www.sciencedirect.com/topics/computer-science/jefferson-diskEric Conrad, Joshua Feldman. Science Direct in CISSP Study Guide (Third Edition), 2016.
- https://www.theworldwar.org/learn/wwi/zimmermann-telegram
- https://www.choctawnation.com/history-culture/people/code-talkers
- https://www.bbc.com/news/magazine-26963624
- https://www.britannica.com/topic/Enigma-German-code-device
- https://www.theguardian.com/technology/2014/nov/14/how-did-enigma-machine-work-imitation-game
- Peter Smirnoff , Dawn M. Turner. CRYPTOMAThIC. Symmetric Key Encryption - why, where and how it’s used in banking.
- https://www.thesslstore.com/blog/symmetric-encryption-101-definition-how-it-works-when-its-used/ vs-asymmetric-encryption
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.