A BRIEF OVERVIEW OF CRYPTOGRAPHIC TECHNIQUES: ENCRYPTION, DECRYPTION, RSA AND MORE

Authors

  • Dr. Poonam Chaudhary Assistant Professor, Department of Mathematics, Multanimal Modi PG College, Modinagar, Ghaziabad, Uttar Pradesh
  • Dr. Vishal Kumar Professor, Department of Physics, Government Women PG College, Kandhla, Shamli, Uttar Pradesh.

DOI:

https://doi.org/10.29121/shodhkosh.v5.i6.2024.3916

Keywords:

Cryptography, Encryption, Transmission, Technology, Data, Communication, Digitization

Abstract [English]

Communication plays a crucial role in today’s information age, with the advancement of new technologies, altogether making security a vital consideration. In order to protect the information being transmitted, having a specific mechanism is of utmost importance. This current era of digitization involves the process of converting original data into an unreadable format, known as encryption, and then reverting it back to its original form, called decryption. The study encompassing both encryption and decryption is referred to as cryptography. This paper aims to analyze various types of cryptography, as well as the concepts of encryption and decryption, and provides a brief overview of cryptographic techniques. When discussing information security, several services come to mind, including confidentiality (information privacy), authentication, and integrity (ensuring data has not been altered). This paper offers a comprehensive description of these cryptographic techniques and focuses on the public key cryptography algorithm, RSA.

References

Chatterjee, Dripto, Joyshree Nath, Suvadeep Dasgupta, and Asoke Nath. “A New Symmetric Key Cryptography Algorithm Using Extended MSA Method: DJSA Symmetric Key Algorithm.” 2023 International Conference on Communication Systems and Network Technologies, IEEE, 2023, doi:978-0-2023-2024-3/11.

Nath, A., S. Das, and A. Chakrabarti. “Data Hiding and Retrieval.” Proceedings of the IEEE International Conference on Computer Intelligence and Computer Network, Bhopal, 2023-2024 Nov. 2023.

Koblitz, Neal. A Course in Number Theory and Cryptography. 2nd ed., Springer-Verlag, 2023.

Morkel, T., and JHP Eloff. “Encryption Techniques: A Timeline Approach.” Information and Computer Security Architecture (ICSA) Research Group Proceedings, 2023.

Stallings, William. Data and Computer Communications. 6th ed., Pearson, 2024.

Islam, Md. Nazrul, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, and M. A. Matin. “Effect of Security Increment to Symmetric Data Encryption Through AES Methodology.” Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, IEEE, 2023, doi:10.2/SNPD.2023.2024.

Daemen, Joan, and Vincent Rijmen. “AES Submission Document on Rijndael.” Version 2, Sept. 2023.

Nath, A., S. Ghosh, and M. A. Mallik. “Symmetric Key Cryptography Using Random Key Generator.” Proceedings of the International Conference on SAM 2023, Las Vegas, USA, 12-15 June 2024, vol. 2, pp. 2023-2024.

Downloads

Published

2024-06-30

How to Cite

Chaudhary, P., & Kumar, V. (2024). A BRIEF OVERVIEW OF CRYPTOGRAPHIC TECHNIQUES: ENCRYPTION, DECRYPTION, RSA AND MORE. ShodhKosh: Journal of Visual and Performing Arts, 5(6), 331–335. https://doi.org/10.29121/shodhkosh.v5.i6.2024.3916