Open Access   Article Go Back

A Survey on Different Cryptographic Techniques

L.R. Mathew1

Section:Survey Paper, Product Type: Journal Paper
Volume-5 , Issue-2 , Page no. 27-29, Feb-2017

Online published on Mar 01, 2017

Copyright © L.R. Mathew . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: L.R. Mathew , “A Survey on Different Cryptographic Techniques,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.27-29, 2017.

MLA Style Citation: L.R. Mathew "A Survey on Different Cryptographic Techniques." International Journal of Computer Sciences and Engineering 5.2 (2017): 27-29.

APA Style Citation: L.R. Mathew , (2017). A Survey on Different Cryptographic Techniques. International Journal of Computer Sciences and Engineering, 5(2), 27-29.

BibTex Style Citation:
@article{Mathew_2017,
author = {L.R. Mathew },
title = {A Survey on Different Cryptographic Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2017},
volume = {5},
Issue = {2},
month = {2},
year = {2017},
issn = {2347-2693},
pages = {27-29},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1172},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1172
TI - A Survey on Different Cryptographic Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - L.R. Mathew
PY - 2017
DA - 2017/03/01
PB - IJCSE, Indore, INDIA
SP - 27-29
IS - 2
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
800 672 downloads 597 downloads
  
  
           

Abstract

Data transmission over the Internet for various purposes has become a necessary part of technology nowadays. But, the data sent over the Internet or the data to be retrieved can be hacked by any other party in several ways. To provide security, various cryptographic schemes have been developed. Among the different schemes the data integrity cannot be ensured in a number of aspects. Cryptography ensures that the message should be sent without any alternation and only the authorized person can be able to open and read the message. Cryptographic techniques can be broadly classified into two methods, namely symmetric and asymmetric. This paper focus mainly on the different kinds of the existing encryption techniques, and a comparative study of different algorithms.

Key-Words / Index Term

Encryption, Cryptography, Symmetric, Asymmetric

References

[1] Stallings W., “Cryptography and Network Security”, 2nd Edition, Prentice Hall, 1999.
[2] Sharma A., Thakur R S and Jaloree S., "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4(5), pp. 5-11, Oct 2016
[3] Dipti K. S., Neha B., “Proposed System for Data Hiding Using Cryptography and Steganography”, International Journal of Computer Appilcations, Vol.8(9), pp.7-10, Oct 2010.
[4] Schneier B., “Description of a New Variable Length Key, 64 Bit Block Cipher (Blowfish)” International Workshop on Fast Software Encryption, Cambridge Security Workshop proceedings, pp.191-204, Dec 1993. ISBN 978-3-540-48456-1
[5] Minaam D. S. A., Abdual-Kader H. M., Hadhoud M.M, “Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types”, International Journal of Network Security, Vol.11(2), pp.78-87, Sep 2010.
[6] Nigam A, Singh V., "Securing Data Transmission in Cloud using Encryption Algorithms", International Journal of Computer Sciences and Engineering, Vol.4(6), pp.21-25, Jun -2016
[7] Rin M. C. J., Lin Y. L., “A VLSI implementation of the Blowfish Encryption/Decryption Algorithm”, ASP-DAC `00 Proceedings of the 2000 Asia and South Pacific Design Automation Conference, Jan 2000. ISBN:0-7803-5974-7
[8] Mathew M, Sumathi D., Ranjima P, Sivaprakash P., "Secure Cloud Data Sharing Using Key-Aggregate Cryptosystem", International Journal of Computer Sciences and Engineering, Vol.2(8), pp. 121-123, Aug -2014
[9] Agarwal M., Mishra P., “A comparitive survey on Symmetric Key Encryption Techniques” International Journal on Computer Sciences and Engineering, Vol.4(5), pp.877-882, May 2012.