Research Paper | Information Technology | Malaysia | Volume 2 Issue 12, December 2013
A Study: Cryptology Techniques and Methodologies
Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and bullet proof they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is.
Keywords: Information Security, Cryptosystems, Network Security, Cryptoanalysis, Cryptography
Edition: Volume 2 Issue 12, December 2013
Pages: 352 - 357
How to Cite this Article?
Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim, "A Study: Cryptology Techniques and Methodologies", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013653, Volume 2 Issue 12, December 2013, 352 - 357
116 PDF Views | 94 PDF Downloads
Similar Articles with Keyword 'Information Security'
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 773 - 778Information Security in ICT from an Islamic Perspective
Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1576 - 1580Intrusion Detection in Wireless Network Using Fuzzy Rules
Ketaki P. Bhusari, Swati G. Kale
Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020
Pages: 1643 - 1647Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana
Issah Bala Abdulai, Abu Sulemana
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1241 - 1243Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology
Prateek Shivhare, Savaridassan.P
Similar Articles with Keyword 'Cryptosystems'
Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015
Pages: 1984 - 1987Lossless and Reversible Data Hiding in Asymmetric Cryptography
Prashant Gholve, H. A. Hingoliwala
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015
Pages: 2430 - 2432Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform
Rishi Kumar Gupta, G. Sujatha
Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013
Pages: 352 - 357A Study: Cryptology Techniques and Methodologies
Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim
Similar Articles with Keyword 'Network Security'
Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016
Pages: 1465 - 1469PTP Method in Network Security for Misbehavior Detection Using Entropy
Neha Pathak, R. S. Apare
Research Paper, Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017
Pages: 2100 - 2104Information and Computer Network Security Policy for Sudanese Telecom Companies
Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar
Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013
Pages: 352 - 357A Study: Cryptology Techniques and Methodologies
Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim
Research Paper, Information Technology, Kenya, Volume 4 Issue 3, March 2015
Pages: 349 - 351An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address
Emmilly Mbichi Mwangi
Research Paper, Information Technology, India, Volume 7 Issue 3, March 2018
Pages: 846 - 849System Monitoring and Communication
Omkar Kolambkar, Namita Kolambkar
Similar Articles with Keyword 'Cryptography'
Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015
Pages: 1984 - 1987Lossless and Reversible Data Hiding in Asymmetric Cryptography
Prashant Gholve, H. A. Hingoliwala
Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015
Pages: 2030 - 2033Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem
Fatima Joselyn Mystica, Gopalakrishnan Prakash
Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015
Pages: 1458 - 1459Remote Voting System Using Extended Visual Cryptography
Tridib Chakraborty, Mizan Md Chowdhury
Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 1043 - 104Comparative Study of MAC Algorithms in Pervasive Computing Environment
P. Bakkiya Lakshmi, K. Kumar
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 2422 - 2427Secure Data Transmission with Hierarchical Clustering
Rahul Raj, J. Godwin Ponsam