Date of Publication :22nd June 2017
Abstract: Data is a collection of information that can be stored digitally. Security is protecting of data. Data security refers to secured digital measures that can be applied to avoid unapproved access to the electronic device. The technology of cryptography protects users by offering functionality for encoding data and authorization of users. Compression includes reducing the size of bits/bytes needed to show a given dataset. This allows the user to save more information. Cryptography offers a secured way of data transmission. AES ought to be one of the strongest cryptographic technique. The present day scenario regarding information includes secrecy, integrity, authentication, etc. The secured communication is an important issue of WWW. The paper focuses on the encryption and compression method of cryptography. Modern cryptography technique is based on calculation theory, computer theory, cryptography algorithms, making algorithms unbreakable.
Reference :
-
- S. Jaryal, N. Kaur, and S. Sharma, ‘Image Encryption Technique Based on Hybridized DNA Cryptography and Compressive Sensing Algorithm’, in Communications in Computer and Information Science, 2019.
- N. D. Nathasia and a. E. Wicaksono, ‘Penerapan Teknik Kriptografi StreamCipher Untuk Pengaman Basis Data’, ICT Research Center UNAS. 2011.
- W. J. Buchanan, Cryptography. 2017.
- D. Ganguly and S. Lahiri, ‘Cryptography and Network Security’, in Network and Application Security, 2011.
- M. Agarwal, ‘Text Steganographic Approaches: A Comparison’, Int. J. Netw. Secur. Its Appl., 2013.
- B. Vinayaga Sundaram, M. Ramnath, M. Prasanth, and J. Varsha Sundaram, ‘Encryption and hash based security in Internet of Things’, in 2015 3rd International Conference on Signal Processing, Communication and Networking, ICSCN 2015, 2015.
- G. V. Bard, Algebraic cryptanalysis. 2009.
- A. U. Rahman, S. U. Miah, and S. Azad, ‘Advanced encryption standard’, in Practical Cryptography: Algorithms and Implementations Using C++, 2014.
- Y. Dodis, K. Haralambiev, A. López-Alt, and D. Wichs, ‘Efficient public-key cryptography in the presence of key leakage’, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010.
- Y. Zhang, X. Chen, J. Li, D. S. Wong, H. Li, and I. You, ‘Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing’, Inf. Sci. (Ny)., 2017.
- R. Tripathi and S. Agrawal, ‘Comparative Study of Symmetric and Asymmetric Cryptography’, Int. J. Adv. Found. Res. Comput., 2014.
- Y. Kumar, R. Munjal, and H. Sharma, ‘Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures’, IJCSMS Int. J. Comput. Sci. Manag. Stud., 2011
- M. Mogollon, Cryptography and Security Services. 2011.