Methods in Cryptography

Abstract

Cryptography, the science and art of secure communication, has evolved into a cornerstone of the digital age. This abstract delves into the core principles, historical development, and contemporary significance of cryptography in the context of data protection, privacy, and cybersecurity.

Historical Foundations: It was initially used for military and diplomatic purposes. From rudimentary ciphers to complex code-breaking machines during World War II, the historical progression of cryptography reflects humanity's quest for secure communication.

Fundamental Principles: Modern cryptography relies on mathematical and computational principles. It encompasses symmetric and asymmetric encryption. Symmetric encryption employs a shared secret key for both encryption and decryption, while asymmetric encryption uses a public-private key pair. Algorithms such as AES and RSA exemplify the robust mathematical foundations of cryptography.

Applications in the Digital Era: In the contemporary digital landscape, cryptography plays a pivotal role in safeguarding sensitive data. It enables secure online transactions, protects information during transmission, and ensures the integrity of data. Beyond communication security, cryptography is vital in diverse fields like blockchain technology, digital signatures, and privacy-preserving protocols.

Country : India

1 Prof. Sunita K. Totade2 Prathmesh R. Kathe3 Chandrakant R. Chavan4 Akshay S. Borkar

  1. Professor, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati, Maharashtra, India
  2. Student, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati, Maharashtra, India
  3. Student, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati, Maharashtra, India
  4. Student, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati, Maharashtra, India

IRJIET, Volume 7, Issue 10, October 2023 pp. 668-672

doi.org/10.47001/IRJIET/2023.710086

References

  1. J. SEBERRY AND J. PIEPRZYK, Cryptography: An Introduction to Computer Security, Prentice-Hall, Upper Saddle River, New Jersey, 1989.
  2. C. E. SHANNON, “Communication Theory of Secrecy Systems”, Bell Systems Technical Journal, 28, 656–715 (1949).
  3. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography.
  4. Ivan Ristic Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications.
  5. I.Blake, G. Seroussi, N. Smart: Elliptic Curves in Cryptography.
  6. R. Churchhouse: Codes and Ciphers.
  7. R. Lidl, H. Niederreiter: Finite Fields (2nd Edition).
  8. M. A. Nielsen, I. L. Chuang: Quantum Computation and Quantum Information.
  9. M. Obaidat, N. Boudriga: Security of e-Systems and Computer Networks.