A Study: Cryptology Techniques and Methodologies
Journal: International Journal of Science and Research (IJSR) (Vol.2, No. 12)Publication Date: 2013-12-05
Authors : Cutifa Safitri; Haroon Shoukat Ali; Jamaludin Bin Ibrahim;
Page : 352-357
Keywords : Information Security; Cryptosystems; Network Security; Cryptoanalysis; Cryptography;
Abstract
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and bullet proof they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is.
Other Latest Articles
- Effect of Spirulina (Candies) Supplementation On Pre-School Children
- A Fuzzy Pattern Application in Multiple Disease Diagnosis on Large Database: Review
- Implementing FC-TCR in Kalpakam - Khammam Line for Voltage Regulation
- Low Noise Amplifier (LNA) Design for 57 Ghz to 63 Ghz EHF Narrow Band Systems
- A Novel Approach of Modified Run Length Encoding Scheme for High Speed Data Communication Application
Last modified: 2021-06-30 20:24:15