Downloads: 134 | Views: 414
Research Paper | Information Technology | Malaysia | Volume 2 Issue 12, December 2013 | Popularity: 6.1 / 10
A Study: Cryptology Techniques and Methodologies
Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim
Abstract: Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and bullet proof they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is.
Keywords: Information Security, Cryptosystems, Network Security, Cryptoanalysis, Cryptography
Edition: Volume 2 Issue 12, December 2013
Pages: 352 - 357
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3
Research Paper, Information Technology, United States of America, Volume 12 Issue 2, February 2023
Pages: 1766 - 1772Remote Browser Isolation: A Path to Zero Trust Security in the Modern Enterprise
Dhaval Gogri
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 2487 - 2494Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices
Jeevan Manda
Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Information Technology, India, Volume 11 Issue 10, October 2022
Pages: 1434 - 1448SD - WAN Technology: Advantages and Use Cases
Udit Patel, Sanjay Poddar
Downloads: 8 | Weekly Hits: ⮙4 | Monthly Hits: ⮙5
Research Paper, Information Technology, United States of America, Volume 13 Issue 10, October 2024
Pages: 914 - 917Data Governance and Security - A Comprehensive Review of Snowflake and Databricks
Rameshbabu Lakshmanasamy
Downloads: 103
Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016
Pages: 1465 - 1469PTP Method in Network Security for Misbehavior Detection Using Entropy
Neha Pathak, R. S. Apare