Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Review of Cryptography: Encryption and Decryption

Author : Ajay Shanker Singh 1 Dheeraj Tripathi 2

Date of Publication :20th June 2017

Abstract: Data is a collection of information that can be stored digitally. Security is protecting of data. Data security refers to secured digital measures that can be applied to avoid unapproved access to the electronic device. The technology of cryptography protects users by offering functionality for encoding data and authorization of users. Compression includes reducing the size of bits/bytes needed to show a given dataset. This allows the user to save more information. Cryptography offers a secured way of data transmission. AES ought to be one of the strongest cryptographic technique. The present day scenario regarding information includes secrecy, integrity, authentication, etc. The secured communication is an important issue of WWW. The paper focuses on the encryption and compression method of cryptography. Modern cryptography technique is based on calculation theory, computer theory, cryptography algorithms, making algorithms unbreakable

Reference :

    1. N. D. Nathasia and a. E. Wicaksono, “Penerapan Teknik Kriptografi StreamCipher Untuk Pengaman Basis Data,” ICT Research Center UNAS. 2011.
    2. W. J. Buchanan, Cryptography. 2017.
    3. D. Ganguly and S. Lahiri, “Cryptography and Network Security,” in Network and Application Security, 2011.
    4. M. Agarwal, “Text Steganographic Approaches: A Comparison,” Int. J. Netw. Secur. Its Appl., 2013, doi: 10.5121/ijnsa.2013.5107.
    5. B. Vinayaga Sundaram, M. Ramnath, M. Prasanth, and J. Varsha Sundaram, “Encryption and hash based security in Internet of Things,” 2015, doi: 10.1109/ICSCN.2015.7219926.
    6. G. V. Bard, Algebraic cryptanalysis. 2009.
    7. A. U. Rahman, S. U. Miah, and S. Azad, “Advanced encryption standard,” in Practical Cryptography: Algorithms and Implementations Using C++, 2014.
    8. Y. Dodis, K. Haralambiev, A. López-Alt, and D. Wichs, “Efficient public-key cryptography in the presence of key leakage,” 2010, doi: 10.1007/978-3-642- 17373-8_35.
    9. Y. Zhang, X. Chen, J. Li, D. S. Wong, H. Li, and I. You, “Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing,” Inf. Sci. (Ny)., 2017, doi: 10.1016/j.ins.2016.04.015.
    10. R. Tripathi and S. Agrawal, “Comparative Study of Symmetric and Asymmetric Cryptography,” Int. J. Adv. Found. Res. Comput., 2014.
    11. Y. Kumar, R. Munjal, and H. Sharma, “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures,” IJCSMS Int. J. Comput. Sci. Manag. Stud., 2011.
    12. M. Mogollon, Cryptography and Security Services. 2011.

Recent Article