A Study: Cryptology Techniques and Methodologies
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 134 | Views: 414

Research Paper | Information Technology | Malaysia | Volume 2 Issue 12, December 2013 | Popularity: 6.1 / 10


     

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim


Abstract: Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and bullet proof they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is.


Keywords: Information Security, Cryptosystems, Network Security, Cryptoanalysis, Cryptography


Edition: Volume 2 Issue 12, December 2013


Pages: 352 - 357



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim, "A Study: Cryptology Techniques and Methodologies", International Journal of Science and Research (IJSR), Volume 2 Issue 12, December 2013, pp. 352-357, https://www.ijsr.net/getabstract.php?paperid=02013653, DOI: https://www.doi.org/10.21275/02013653

Similar Articles

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Research Paper, Information Technology, United States of America, Volume 12 Issue 2, February 2023

Pages: 1766 - 1772

Remote Browser Isolation: A Path to Zero Trust Security in the Modern Enterprise

Dhaval Gogri

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2487 - 2494

Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices

Jeevan Manda

Share this Article

Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 1434 - 1448

SD - WAN Technology: Advantages and Use Cases

Udit Patel, Sanjay Poddar

Share this Article

Downloads: 8 | Weekly Hits: ⮙4 | Monthly Hits: ⮙5

Research Paper, Information Technology, United States of America, Volume 13 Issue 10, October 2024

Pages: 914 - 917

Data Governance and Security - A Comprehensive Review of Snowflake and Databricks

Rameshbabu Lakshmanasamy

Share this Article

Downloads: 103

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article
Top