CRYPTOGRAPHY AND ITS TECHNIQUES: A REVIEW

Authors

  • Alka Bamotra Department of Computer Science and IT, Baring Union Christian College, Batala, Punjab, India

Keywords:

RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography), Cryptography, Security, Algorithm, Cipher, Decryption, Data Security.

Abstract

With the internet having reached a level that merges with our lives, growing explosively during the last several decades, data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification or alteration of data. In order to achieve this level of security, various algorithms and methods have been developed. Cryptography can be defined as techniques that cipher data, depending on specific algorithms that make the data unreadable to the human eye unless decrypted by algorithms that are predefined by the sender. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. Main concentration is on various algorithms including DES, RSA.

References

Abdullah Said Alkalbani et al., 2010. “Comparison between RSA Hardware and Software Implementation for WSNs Security Schemes,” In proceeding 3rd International Conference on ICT4M.

Amin, F. Jahangir, A. H. and Rasifard, H. 2008. “Analysis Of Publickey Cryptography For Wireless Sensor Networks Security,” In Proceedings of World Academy of Science, Engineering and Technology.

Anderson, H. 2004. Introduction to Computer Security, Prentice Hall. pp 85-86.

Callas, J. 2007. "The Future of Cryptography," Information Systems Security, 16(1): 15-22.

Chandra M. Kota et al., 2002. “Implementation of the RSA algorithm and its cryptanalysis,” In proceedings of the ASEE Gulf-Southwest Annual Conference.

David A. Carts. 2001. “A Review of the DiffieHellman Algorithm and its Use in Secure Internet Protocols,” SANS institute.

Erfaneh Noorouzil et al, 2011. “A New Digital Signature Algorithm”, International Conference on Machine Learning and Computing, IPCSIT vol.3.

Gupta, A. and Walia, N. K. 2014. "Cryptography Algorithms: A Review," International Journal of Engineering Development and Research, 2(2): 1667-1672.

Jirwan, N. Singh, A. and Vijay, S. 2013. "Review and Analysis of Cryptography Techniques," International Journal of Scientific & Engineering Research, 3(4): 1-6.

Khalifa, O. O. Islam, M. R. Khan, S. and Shebani, M. S. 2004. "Communications cryptography," in RF and Microwave Conference, RFM 2004. Proceedings, Selangor.

Lauter, K. 2004. “The Advantages of Elliptic Curve Cryptography for Wireless.

Lincke, S. J. and Hollan, A. 2007. "Network Security: Focus on Security, Skills, and Stability," in 37th ASEE/IEEE Frontiers in Education Conference, Milwaukee.

Massey, J. L. 1986. "Cryptography-A selective survey," Digital Communications, 85: 3-25.

Perrig, A. Stankovic, J. and Wagner, D. 2004. “Security In Wireless Sensor Networks,” ACM, 47(653).

Schneier, B. 2004. "The Non-Security of Secrecy," Communications of the ACM, 47(10): 120.

Singh, P Yadav et al., 2012. “Implementation of RSA algorithm using Elliptic Curve Algorithm for security and performance enhancement,” International Journal of Scientific & Technology Research 1(4).

Tayal, S. Gupta, N. Gupta, P. Goyal, D. and Goyal, M. 2017. "A Review paper on Network Security and Cryptography," Advances in Computational Sciences and Technology , 10 (5): 763- 770.

Varol, N., Aydoğan F. and Varol, A. 2007. ,"Cyber Attacks Targetting Android Cellphones," in The 5th International Symposium on Digital Forensics and Security (ISDFS 2017), Tirgu Mures.

Wilson, S. B. et al., 1997. “Key agreement protocols and their security analysis.”

Zuccherato, R. 2000. “Elliptic Curve Cryptography Support in Entrust,” Entrust ltd. in Canada.

Downloads

Published

2022-06-30

How to Cite

Alka Bamotra. (2022). CRYPTOGRAPHY AND ITS TECHNIQUES: A REVIEW. Journal Punjab Academy of Sciences, 22, 28–33. Retrieved from https://jpas.in/index.php/home/article/view/31