ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Synopsis of Pure and Applied Cryptography

Journal: International Journal of Science and Research (IJSR) (Vol.11, No. 6)

Publication Date:

Authors : ;

Page : 1370-1373

Keywords : Encryption; Decryption; plain text; Cypher-text Symmetric Algorithm; Public-Key Algorithm; Known Plain-Text attack; Rubber-hose cryptoanalysis; chosen cyper-text attack; Security of Algorithms; Steganography;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The literature of cryptography has a curious story. Secrecy, of course, played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion. After the First World War, however things began to change US. Army and Navy organizations working entirely in secret. In the "imitation Game" We see that Allen turing build a machine called "The Enigma Machine". And using statistical method he inspired to win the world war. This was an extraordinary example of the application of mathematics to see how math works in every section of life. I am going to write a series of paper of cryptology for everyone. It will be a good reading for anyone interest in cryptology and want to know more!!

Last modified: 2022-09-07 15:17:07