A Study: Cryptology Techniques and Methodologies
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 134

Research Paper | Information Technology | Malaysia | Volume 2 Issue 12, December 2013

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim

Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and bullet proof they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is.

Keywords: Information Security, Cryptosystems, Network Security, Cryptoanalysis, Cryptography

Edition: Volume 2 Issue 12, December 2013

Pages: 352 - 357

Share this Article

How to Cite this Article?

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim, "A Study: Cryptology Techniques and Methodologies", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013653, Volume 2 Issue 12, December 2013, 352 - 357

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Information Security'

Downloads: 110

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Downloads: 112

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article

Downloads: 114 | Monthly Hits: ⮙1

Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 773 - 778

Information Security in ICT from an Islamic Perspective

Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani

Share this Article

Downloads: 114

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Downloads: 117

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this Article

Similar Articles with Keyword 'Cryptosystems'

Downloads: 110

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Downloads: 112

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2430 - 2432

Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform

Rishi Kumar Gupta, G. Sujatha

Share this Article

Downloads: 134

Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013

Pages: 352 - 357

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim

Share this Article

Similar Articles with Keyword 'Network Security'

Downloads: 103

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Downloads: 122 | Monthly Hits: ⮙1

Research Paper, Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017

Pages: 2100 - 2104

Information and Computer Network Security Policy for Sudanese Telecom Companies

Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar

Share this Article

Downloads: 129

Research Paper, Information Technology, Kenya, Volume 4 Issue 3, March 2015

Pages: 349 - 351

An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi

Share this Article

Downloads: 134

Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013

Pages: 352 - 357

A Study: Cryptology Techniques and Methodologies

Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim

Share this Article

Downloads: 141

Research Paper, Information Technology, Kenya, Volume 7 Issue 3, March 2018

Pages: 1355 - 1362

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia

Share this Article

Similar Articles with Keyword 'Cryptography'

Downloads: 105

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Downloads: 107 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article

Downloads: 108

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Downloads: 109

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1285 - 1288

Key Aggregate Cryptosystem for Data Sharing in Cloud Computing

Rohit Tate, Jyoti Pingalkar

Share this Article

Downloads: 109 | Weekly Hits: ⮙5 | Monthly Hits: ⮙12

Comparative Studies, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 2013 - 2019

Comprehensive Research on Privacy Preserving Emphasizing on Distributed Clustering

Prajna M.S., Sumana M.

Share this Article



Top