A Survey on Different Cryptographic Techniques
L.R. Mathew1
Section:Survey Paper, Product Type: Journal Paper
Volume-5 ,
Issue-2 , Page no. 27-29, Feb-2017
Online published on Mar 01, 2017
Copyright © L.R. Mathew . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: L.R. Mathew , “A Survey on Different Cryptographic Techniques,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.27-29, 2017.
MLA Style Citation: L.R. Mathew "A Survey on Different Cryptographic Techniques." International Journal of Computer Sciences and Engineering 5.2 (2017): 27-29.
APA Style Citation: L.R. Mathew , (2017). A Survey on Different Cryptographic Techniques. International Journal of Computer Sciences and Engineering, 5(2), 27-29.
BibTex Style Citation:
@article{Mathew_2017,
author = {L.R. Mathew },
title = {A Survey on Different Cryptographic Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2017},
volume = {5},
Issue = {2},
month = {2},
year = {2017},
issn = {2347-2693},
pages = {27-29},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1172},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1172
TI - A Survey on Different Cryptographic Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - L.R. Mathew
PY - 2017
DA - 2017/03/01
PB - IJCSE, Indore, INDIA
SP - 27-29
IS - 2
VL - 5
SN - 2347-2693
ER -
VIEWS | XML | |
800 | 672 downloads | 597 downloads |
Abstract
Data transmission over the Internet for various purposes has become a necessary part of technology nowadays. But, the data sent over the Internet or the data to be retrieved can be hacked by any other party in several ways. To provide security, various cryptographic schemes have been developed. Among the different schemes the data integrity cannot be ensured in a number of aspects. Cryptography ensures that the message should be sent without any alternation and only the authorized person can be able to open and read the message. Cryptographic techniques can be broadly classified into two methods, namely symmetric and asymmetric. This paper focus mainly on the different kinds of the existing encryption techniques, and a comparative study of different algorithms.
Key-Words / Index Term
Encryption, Cryptography, Symmetric, Asymmetric
References
[1] Stallings W., “Cryptography and Network Securityâ€, 2nd Edition, Prentice Hall, 1999.
[2] Sharma A., Thakur R S and Jaloree S., "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4(5), pp. 5-11, Oct 2016
[3] Dipti K. S., Neha B., “Proposed System for Data Hiding Using Cryptography and Steganographyâ€, International Journal of Computer Appilcations, Vol.8(9), pp.7-10, Oct 2010.
[4] Schneier B., “Description of a New Variable Length Key, 64 Bit Block Cipher (Blowfish)†International Workshop on Fast Software Encryption, Cambridge Security Workshop proceedings, pp.191-204, Dec 1993. ISBN 978-3-540-48456-1
[5] Minaam D. S. A., Abdual-Kader H. M., Hadhoud M.M, “Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Typesâ€, International Journal of Network Security, Vol.11(2), pp.78-87, Sep 2010.
[6] Nigam A, Singh V., "Securing Data Transmission in Cloud using Encryption Algorithms", International Journal of Computer Sciences and Engineering, Vol.4(6), pp.21-25, Jun -2016
[7] Rin M. C. J., Lin Y. L., “A VLSI implementation of the Blowfish Encryption/Decryption Algorithmâ€, ASP-DAC `00 Proceedings of the 2000 Asia and South Pacific Design Automation Conference, Jan 2000. ISBN:0-7803-5974-7
[8] Mathew M, Sumathi D., Ranjima P, Sivaprakash P., "Secure Cloud Data Sharing Using Key-Aggregate Cryptosystem", International Journal of Computer Sciences and Engineering, Vol.2(8), pp. 121-123, Aug -2014
[9] Agarwal M., Mishra P., “A comparitive survey on Symmetric Key Encryption Techniques†International Journal on Computer Sciences and Engineering, Vol.4(5), pp.877-882, May 2012.