CRYPTOGRAPHY AND ITS TECHNIQUES: A REVIEW

Authors

  • Alka Bamotra Department of Computer Science and IT, Baring Union Christian College, Batala, Punjab, India

Keywords:

RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography), Cryptography, Security, Algorithm, Cipher, Decryption, Data Security

Abstract

With the internet having reached a level that merges with our lives, growing explosively during the last several decades, data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification or alteration of data. In order to achieve this level of security, various algorithms and methods have been developed. Cryptography can be defined as techniques that cipher data, depending on specific algorithms that make the data unreadable to the human eye unless decrypted by algorithms that are predefined by the sender. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. Main concentration is on various algorithms including DES, RSA. 

Downloads

Published

2022-12-30

How to Cite

CRYPTOGRAPHY AND ITS TECHNIQUES: A REVIEW. (2022). JOURNAL PUNJAB ACADEMY OF SCIENCES, 22, 27-33. https://jpas.in/index.php/home/article/view/38