ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.5, No. 3)

Publication Date:

Authors : ; ; ; ; ; ;

Page : 917-924

Keywords : KEYWORDS: Encryption; Decryption; Cryptanalysis; key.;

Source : Downloadexternal Find it from : Google Scholarexternal


Today the use of computers in every one life is a common and easy way to improve day to day life and to lead the community at large to nurture the benefits of modern technologies, but this common path needs security, in its operations. In the early part of 21st Century computer networks were used as a daily tool for a human being for sending e-mails, making online transactions, sharing devices. The art of secret writing is 'CRYPTOGRAPHY’, which enables a secured communication between two people over an insecure channel in such a way that the other opponents in the path cannot harm the communicators .This article throws light on process of sharing the information to a form that will be unintelligible to an unintended person by symmetric and asymmetric cryptography. It helps to understand the creation of basic 'CRYPTOSYSTEM’, and also focus on the difficulties and challenges in use of cryptography in network security ,with a suggested solution on the problem .The sender and recipient may use same key and encryption /decryption algorithm to encrypt /decrypt given data or may use different key in public key cryptography. All secure data transactions including defence, net payment, access control, business and e-commerce apply cryptography in their operations to safeguard their interests. The use of cryptography technique is the reliable modern tool to build a fair system of confidentiality, integrity and control access, availability & authentication of data. The art and science of concealing the message to introduce secrecy in information security is Cryptography. As the cipher text is public and attackers can get the information and in asymmetric cryptography it require more processing power and computational time we present ECC and quantum computational algorithm.

Last modified: 2016-03-27 18:54:40