A Review Paper on Cryptography

被引:18
作者
Qadir, Abdalbasit Mohammed [1 ]
Varol, Nurhayat [2 ]
机构
[1] Firat Univ, Software Engn Dept, Elazig, Turkey
[2] Firat Univ, TBMYO, Elazig, Turkey
来源
2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS) | 2019年
关键词
Cryptography; Security; Algorithm; Cipher; Decryption; Data Security;
D O I
10.1109/isdfs.2019.8757514
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the internet having reached a level that merges with our lives, growing explosively during the last several decades, data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification or alteration of data. In order to achieve this level of security, various algorithms and methods have been developed. Cryptography can be defined as techniques that cipher data, depending on specific algorithms that make the data unreadable to the human eye unless decrypted by algorithms that are predefined by the sender.
引用
收藏
页数:6
相关论文
共 24 条
[1]  
Aumasson Jean-Philippe, 2017, Serious cryptography
[2]  
Callas J., 2007, Information Systems Security, V16, P15, DOI 10.1080/10658980601051284
[3]  
Chachapara K, 2013, NIRMA UNIV INT CONF
[4]  
Denis T S, 2007, CRYPTOGRAPHY DEV
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]  
Dooley JohnF., 2013, A Brief History of Cryptology and Cryptographic Algorithms
[7]   Randomness in cryptography [J].
Gennaro, R .
IEEE SECURITY & PRIVACY, 2006, 4 (02) :64-67
[8]  
Goldreich Oded, 2004, Basic Applications, V2
[9]  
Gupta A., 2014, International Journal of Engineering Development and Research, V2, P1667
[10]  
Jirwan N., 2013, Int. J. Sci. Eng. Res, V4, P1