A Synopsis of Pure and Applied Cryptography
Journal: International Journal of Science and Research (IJSR) (Vol.11, No. 6)Publication Date: 2022-06-05
Authors : Maher Ali Rusho;
Page : 1370-1373
Keywords : Encryption; Decryption; plain text; Cypher-text Symmetric Algorithm; Public-Key Algorithm; Known Plain-Text attack; Rubber-hose cryptoanalysis; chosen cyper-text attack; Security of Algorithms; Steganography;
Abstract
The literature of cryptography has a curious story. Secrecy, of course, played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion. After the First World War, however things began to change US. Army and Navy organizations working entirely in secret. In the "imitation Game" We see that Allen turing build a machine called "The Enigma Machine". And using statistical method he inspired to win the world war. This was an extraordinary example of the application of mathematics to see how math works in every section of life. I am going to write a series of paper of cryptology for everyone. It will be a good reading for anyone interest in cryptology and want to know more!!
Other Latest Articles
- Will Dostarlimab Become the New Rectal Cancer Drug of Choice?
- Design & Fabrication of Manless Defense Robot
- The Life-Saving Mission for COVID-19 Vaccination on Google Cloud (GC) Ecosystem
- Problems Faced by the Physiotherapists Wearing PPE Kit While Treating the Covid Patients
- IoT Enabled Edge Computing Healthcare and Security System for Isolated Patients
Last modified: 2022-09-07 15:17:07