International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Information Technology | Malaysia | Volume 2 Issue 12, December 2013

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim

Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and bullet proof they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is.

Keywords: Information Security, Cryptosystems, Network Security, Cryptoanalysis, Cryptography

Edition: Volume 2 Issue 12, December 2013

Pages: 352 - 357


How to Cite this Article?

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim, "A Study: Cryptology Techniques and Methodologies", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013653, Volume 2 Issue 12, December 2013, 352 - 357

19 PDF Views | 19 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Information Security'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this article

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this article

Similar Articles with Keyword 'Cryptosystems'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2430 - 2432

Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform

Rishi Kumar Gupta, G. Sujatha

Share this article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013

Pages: 352 - 357

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim

Share this article

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this article

Similar Articles with Keyword 'Network Security'

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013

Pages: 352 - 357

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim

Share this article

Research Paper, Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017

Pages: 2100 - 2104

Information and Computer Network Security Policy for Sudanese Telecom Companies

Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar

Share this article

Research Paper, Information Technology, Kenya, Volume 4 Issue 3, March 2015

Pages: 349 - 351

An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi

Share this article

Research Paper, Information Technology, India, Volume 7 Issue 3, March 2018

Pages: 846 - 849

System Monitoring and Communication

Omkar Kolambkar, Namita Kolambkar

Share this article

Similar Articles with Keyword 'Cryptography'

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 1459 - 1462

An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques

Kavyashree S, Manjula V, Gnanashree S

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 2120 - 2124

Verifier Based Prevention for an Offline Password Guessing Attack Using ECC

Radhika L. Bhosale, Manoj L. Bangare

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2430 - 2432

Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform

Rishi Kumar Gupta, G. Sujatha

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 8, August 2014

Pages: 2009 - 2016

(t, n) Threshold Scheme to Enhance the Security of the Password Repository

Malladi Venkata Naga Kiranmai, Avinab Marahatta, K. Suresh Babu

Share this article

Top