International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 191 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers | Computer Science & Engineering | India | Volume 9 Issue 1, January 2020


A Review Paper on Network Security and Cryptography

Preeti Dewangan


Abstract: Cryptography is the science of information security. The word is derived from the Greek kryptos, meaning concealed. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide in order in storage or transit. Modern cryptography intersect the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords. Cryptology prior to the modern age was almost one and the same with Encryption, the translation of information from a understandable state to apparent nonsense. The sender retained the ability to decrypt the information and therefore avoid redundant persons being able to read it.


Keywords: Security, Cryptography, Encryption


Edition: Volume 9 Issue 1, January 2020,


Pages: 524 - 527


How to Cite this Article?

Preeti Dewangan, "A Review Paper on Network Security and Cryptography", International Journal of Science and Research (IJSR), Volume 9 Issue 1, January 2020, pp. 524-527, https://www.ijsr.net/get_abstract.php?paper_id=ART20204060

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Security'

Downloads: 123 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [15]

Share this Article


Top