Methods in Cryptography

Prof. Sunita K. TotadeProfessor, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati, Maharashtra, IndiaPrathmesh R. KatheStudent, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati, Maharashtra, IndiaChandrakant R. ChavanStudent, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati, Maharashtra, IndiaAkshay S. BorkarStudent, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati, Maharashtra, India

Vol 7 No 10 (2023): Volume 7, Issue 10, October 2023 | Pages: 668-672

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 09-11-2023

doi Logo doi.org/10.47001/IRJIET/2023.710086

Abstract

Cryptography, the science and art of secure communication, has evolved into a cornerstone of the digital age. This abstract delves into the core principles, historical development, and contemporary significance of cryptography in the context of data protection, privacy, and cybersecurity.

Historical Foundations: It was initially used for military and diplomatic purposes. From rudimentary ciphers to complex code-breaking machines during World War II, the historical progression of cryptography reflects humanity's quest for secure communication.

Fundamental Principles: Modern cryptography relies on mathematical and computational principles. It encompasses symmetric and asymmetric encryption. Symmetric encryption employs a shared secret key for both encryption and decryption, while asymmetric encryption uses a public-private key pair. Algorithms such as AES and RSA exemplify the robust mathematical foundations of cryptography.

Applications in the Digital Era: In the contemporary digital landscape, cryptography plays a pivotal role in safeguarding sensitive data. It enables secure online transactions, protects information during transmission, and ensures the integrity of data. Beyond communication security, cryptography is vital in diverse fields like blockchain technology, digital signatures, and privacy-preserving protocols.

Keywords

Cryptography, Information Security, Encryption, Decryption, Digital Privacy, Digital Signatures, Blockchain, Quantum Computing, Cybersecurity


Citation of this Article

Prof. Sunita K. Totade, Prathmesh R.  Kathe, Chandrakant R. Chavan, Akshay S. Borkar, “Methods in Cryptography” Published in International Research Journal of Innovations in Engineering and Technology - IRJIET, Volume 7, Issue 10, pp 668-672, October 2023. Article DOI https://doi.org/10.47001/IRJIET/2023.710086

References
  1. J. SEBERRY AND J. PIEPRZYK, Cryptography: An Introduction to Computer Security, Prentice-Hall, Upper Saddle River, New Jersey, 1989.
  2. C. E. SHANNON, “Communication Theory of Secrecy Systems”, Bell Systems Technical Journal, 28, 656–715 (1949).
  3. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography.
  4. Ivan Ristic Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications.
  5. I.Blake, G. Seroussi, N. Smart: Elliptic Curves in Cryptography.
  6. R. Churchhouse: Codes and Ciphers.
  7. R. Lidl, H. Niederreiter: Finite Fields (2nd Edition).
  8. M. A. Nielsen, I. L. Chuang: Quantum Computation and Quantum Information.
  9. M. Obaidat, N. Boudriga: Security of e-Systems and Computer Networks.