International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064


Downloads: 134

Research Paper | Information Technology | Malaysia | Volume 2 Issue 12, December 2013


A Study: Cryptology Techniques and Methodologies

Cutifa Safitri [5] | Haroon Shoukat Ali [2] | Jamaludin Bin Ibrahim [4]


Abstract: Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and bullet proof they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is.


Keywords: Information Security, Cryptosystems, Network Security, Cryptoanalysis, Cryptography


Edition: Volume 2 Issue 12, December 2013,


Pages: 352 - 357


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim, "A Study: Cryptology Techniques and Methodologies", International Journal of Science and Research (IJSR), Volume 2 Issue 12, December 2013, pp. 352-357, https://www.ijsr.net/get_abstract.php?paper_id=02013653

Similar Articles with Keyword 'Information Security'

Downloads: 110

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah | Nur Faizah Binti Ab Aziz [2] | Maya Novia Sari [2] | Jamaludin Bin Ibrahim [4]

Share this Article

Downloads: 112

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai | Abu Sulemana [2]

Share this Article
Top