A Study: Cryptology Techniques and Methodologies
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | Malaysia | Volume 2 Issue 12, December 2013

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim

Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and bullet proof they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is.

Keywords: Information Security, Cryptosystems, Network Security, Cryptoanalysis, Cryptography

Edition: Volume 2 Issue 12, December 2013

Pages: 352 - 357

Share this Article

How to Cite this Article?

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim, "A Study: Cryptology Techniques and Methodologies", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013653, Volume 2 Issue 12, December 2013, 352 - 357

116 PDF Views | 94 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Information Security'

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 773 - 778

Information Security in ICT from an Islamic Perspective

Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this Article

Similar Articles with Keyword 'Cryptosystems'

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2430 - 2432

Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform

Rishi Kumar Gupta, G. Sujatha

Share this Article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013

Pages: 352 - 357

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim

Share this Article

Similar Articles with Keyword 'Network Security'

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Research Paper, Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017

Pages: 2100 - 2104

Information and Computer Network Security Policy for Sudanese Telecom Companies

Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar

Share this Article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013

Pages: 352 - 357

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim

Share this Article

Research Paper, Information Technology, Kenya, Volume 4 Issue 3, March 2015

Pages: 349 - 351

An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi

Share this Article

Research Paper, Information Technology, India, Volume 7 Issue 3, March 2018

Pages: 846 - 849

System Monitoring and Communication

Omkar Kolambkar, Namita Kolambkar

Share this Article

Similar Articles with Keyword 'Cryptography'

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1043 - 104

Comparative Study of MAC Algorithms in Pervasive Computing Environment

P. Bakkiya Lakshmi, K. Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2422 - 2427

Secure Data Transmission with Hierarchical Clustering

Rahul Raj, J. Godwin Ponsam

Share this Article
Top