Revelation of Cryptography

Authors

  • Soham Mehta  Department of Computer Engineering, SAKEC, Mumbai, Maharastra, India
  • Deep Nandu  Department of Computer Engineering, SAKEC, Mumbai, Maharastra, India

DOI:

https://doi.org/10.32628/CSEIT217233

Keywords:

Cipher text, Encryption, Secret Message, Cryptographic Techniques, Secret Message, Cryptanalysis, Modern Encryption

Abstract

As the means of communications matured and developed so did the need of secret message keeping, as we discover new and more sophisticated cryptographic techniques are being developed to aid in securing the communications between sender and receiver. Some of cryptographers started to come up with new techniques to hide the data using new encryption methods while others came up with new techniques to break the said encryption methods and this led to many great evolutions in the communication sector, as the communications became digital from analog secret message keeping became far more important and led to the introduction of various protocols and frameworks to support their need of secret message keeping.

References

  1. Nicholas G. McDonald, Department of Electrical and Computer Engineering, University of Utah. “Past, Present, Future Methods of Cryptography and Data Encryption”, Utah, USA.
  2. Soumitra Bhattacharya. 2019. International Journal on Cryptography and Information Security (IJCIS), Vol. 9, No.1/2, June 2019,
  3. CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY Whitefield Diffie, Cryptography: Past, present and Future. Springer.
  4. https://www.tutorialspoint.com/cryptography/modern_cryptography.html
  5. https://www.semanticscholar.org/paper/Essay-15-Cryptography-Abrams-Podell/62a3f959c11b8209f191592216d74f67beba9ffd
  6. https://www.tutorialspoint.com/cryptography/origin_of_cryptography.html
  7. http://www.rsa.com/rsalabs/node.asp?id=2094
  8. Dan Boneh. The Theory and Application of Cryptology and Information Security. “Pairing-Based Cryptography: Past, Present, and Future”.
  9. https://economictimes.indiatimes.com/definition/cryptography
  10. https://www.csoonline.com/article/3583976/what-is-cryptography-how-algorithms-keep-information-secret-and-safe.html
  11. https://medium.com/@.Qubit/what-is-cryptography-a18423c82e47
  12. https://towardsdatascience.com/the-basics-of-cryptography-80c7906ba2f7
  13. http://cryptogramma.com/cryptogramma/How_it_works.html
  14. https://www.dcode.fr/caesar-cipher
  15. https://crypto.interactive-maths.com/vigenegravere-cipher.html
  16. https://www.sciencedirect.com/topics/computer-science/jefferson-diskJason Andress. Science Direct. The Basics of Information Security, 2011.
  17. https://www.sciencedirect.com/topics/computer-science/jefferson-diskEric Conrad, Joshua Feldman. Science Direct in CISSP Study Guide (Third Edition), 2016.
  18. https://www.theworldwar.org/learn/wwi/zimmermann-telegram
  19. https://www.choctawnation.com/history-culture/people/code-talkers
  20. https://www.bbc.com/news/magazine-26963624
  21. https://www.britannica.com/topic/Enigma-German-code-device
  22. https://www.theguardian.com/technology/2014/nov/14/how-did-enigma-machine-work-imitation-game
  23. Peter Smirnoff , Dawn M. Turner. CRYPTOMAThIC. Symmetric Key Encryption - why, where and how it’s used in banking.
  24. https://www.thesslstore.com/blog/symmetric-encryption-101-definition-how-it-works-when-its-used/ vs-asymmetric-encryption

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
Soham Mehta, Deep Nandu, " Revelation of Cryptography" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 2, pp.108-117, March-April-2021. Available at doi : https://doi.org/10.32628/CSEIT217233