A Research Paper on Cryptography

Authors

  • Ardalkar Shivam Dhanaji  Department of Computer Engineering, Zeal College of Engineering and Research, Pune, Maharashtra, India
  • Kaduskar Praful Gajanan  Department of Computer Engineering, Zeal College of Engineering and Research, Pune, Maharashtra, India
  • Kate Abhijit Pandurang  Department of Computer Engineering, Zeal College of Engineering and Research, Pune, Maharashtra, India

Keywords:

Cryptography, Security, Algorithm, Cipher, Decryption, Data Security.

Abstract

With the internet having reached a level that merges with our lives, growing explosively during the last several decades, data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification or alteration of data. In order to achieve this level of security, various algorithms and methods have been developed. Cryptography can be defined as techniques that cipher data, depending on specific algorithms that make the data unreadable to the human eye unless decrypted by algorithms that are predefined by the sender.

References

  1. N. Sharma , Prabhjot and H. Kaur, "A Review of Information Security using Cryptography Technique," International Journal of Advanced Research in Computer Science, vol. 8, no. Special Issue, pp. 323-326, 2017.
  2. B. Preneel, Understanding Cryptography: A Textbook for Students and Practitioners, London: Springer, 2010.
  3. J. Katz and Y. Lindell, lntroduct:ion t:o Modern Cryptography, London: Taylor & Francis Group, LLC , 2008.
  4. S. J. Lincke and A. Hollan, "Network Security: Focus on Security, Skills, and Stability," in 37th ASEE/IEEE Frontiers in Education Conference, Milwaukee, 2007.
  5. O. O. Khalifa, M. R. Islam, S. Khan and M. S. Shebani, "Communications cryptography," in RF and Microwave Conference, 2004. RFM 2004. Proceedings, Selangor, 2004.
  6. N. Jirwan, A. Singh and S. Vijay , "Review and Analysis of Cryptography Techniques," International Journal of Scientific & Engineering Research, vol. 3, no. 4, pp. 1-6, 2013 . [7] S. Tayal, N. Gupta, P. Gupta, D. Goyal and M. Goyal, "A Review paper on Network Security and Cryptography," Advances in Computational Sciences and Technology , vol. 10, no. 5, pp. 763770, 2017.
  7. A. Gupta and N. K. Walia, "Cryptography Algorithms: A Review," NTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH, vol. 2, no. 2, pp. 1667- 1672, 2014.
  8. J. Callas, "The Future of Cryptography," Information Systems Security, vol. 16, no. 1, pp. 15- 22, 2007.
  9. J. L. Massey, "Cryptography—A selective survey," Digital Communications, vol. 85, pp. 3-25, 1986.
  10. B. Schneier, "The Non-Security of Secrecy," Communications of the ACM, vol. 47, no. 10, pp. 120-120, 2004.
  11. N. Varol, F. Aydoğan and A. Varol, "Cyber Attacks Targetting Android Cellphones," in The 5th International Symposium on Digital Forensics and Security (ISDFS 2017), Tirgu Mures, 2017.
  12. K. Chachapara and S. Bhadlawala, "Secure sharing with cryptography in cloud," in 2013 Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, 2013. [14] H. Orman, "Recent Parables in Cryptography," IEEE Internet Computing, vol. 18, no. 1, pp. 82-86, 2014.
  13. R. GENNARO, "IEEE Security & Privacy," IEEE Security & Privacy, vol. 4, no. 2, pp. 64 - 67, 2006.
  14. B. Preneel, "Cryptography and Information Security in the PostSnowden Era," in IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity, Florence, 2015.
  15. S. B. Sadkhan, "Cryptography : current status and future trends," in International Conference on Information and Communication Technologies: From Theory to Applications, Damascus, 2004. [18] F. Piper and S. Murphy, Cryptography: A Very Short Introduction, London: Oxford University Press, 2002. [19] J. P. Aumasson, SERIOUS CRYPTOGRAPHY A Practical Introduction to Modern Encryption, San Francisco: No Starch Press, Inc, 2018 .
  16. J. F. Dooley, A Brief History of Cryptology and Cryptographic Algorithms, New York: Springer, 2013. [21] T. S. Denis and S. Johnson, Cryptography for Developers, Boston: Syngress Publishing Inc, 2007 .
  17. W. D. A. M. E. HELLMAN, "New directions in cryptography," IEEE Transactions on Information Theory, Vols. IT-22, no. 6, pp. 644-654, 1976.
  18. W. Stallings, Cryptography and Network Security Principles and Practices, New York: Prentice Hall, 2005. [24] O. Goldreich, Foundations of Cryptography Basic Tools, Cambridge: Cambridge University Press, 2004.

Downloads

Published

2022-02-28

Issue

Section

Research Articles

How to Cite

[1]
Ardalkar Shivam Dhanaji, Kaduskar Praful Gajanan, Kate Abhijit Pandurang, " A Research Paper on Cryptography, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 1, pp.328-336, January-February-2022.