Cryptography and Types Encryption and Decryption...
Abstract
When we are talking about communication over a network, we need to make sure that there is some sort of security for the information being communicated. Security has to be provided since the information is vulnerable. Cryptography is a powerful technique that can be used for ensuring security. Cryptography provides a way of network security which deals with hiding "real" information from others while transmitting between two parties. Usually, the real information is transformed or hidden into another message and transmitted over the network. This transformed message in itself will make no sense even if any hacker gets hold of this information. Converting real information into what looks like garbage value this process is called as Encryption, the process of extracting real information back from this meaningless text is called as Decryption. This whole encryption and decryption strategy is based on the premise that both sender and receiver share some unique keys which is not known by any outsiders, like the hackers. Based on keys there are two types of Cryptography methods Symmetric and Asymmetric cryptography.
Keywords
Full Text:
PDFReferences
Journal References:
. Cryptography & Security implementation in Network Computing Environments by Rajnikanth Pandey, Vinay kumar Pandey, 978-9-3805-4421-2/16/$31.00_c 2016 IEEE
. Big Data Protection Via Neural and Quantum Cryptography by Deepiksha Sharma, Amitha Sharma, 978-9-3805-4421-2/16/$31.00_c 2016 IEEE
. Advantages of Classical Cryptography over the Quantum Cryptography by Vibha Ojha, World Applied Programming, Vol (2), Issue (5), May 2012. 257-262 Special section for proceeding of International E-Conference on Information Technology and Applications (IECITA) 2012
Book References:
. William Stallings, “Cryptography and Network Security – Principles and Practices”
. Behrouz A. Forouzan and Debdeep Mukhopadhyay: “Cryptography and Network Security”, 2nd Edition, Tata McGraw-Hill, 2010.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.