A Survey Paper on Cryptography Techniques

نویسندگان

  • A. Joseph Amalraj
  • John Raybin Jose
چکیده

In the modern era evaluation of networking and wireless networks has come in information and communication technology, there are so many things that gives facility to deal with these technology using internet. In internet email security is main aspect and the process of cryptography plays an important role to provide the security to the networks. To improve security and efficiency, most email system adopt Public Key Infrastructure (PKI) as the mechanism to implement security, but public key infrastructure based systems suffer from expensive certificate management and problems in scalability. The main objective of this approach is awareness of email security and its requirements to the common computer users. A number of cryptographic techniques are developed for achieving secure communication. The proposed mailing system is secure against standard security model. Keywords— Encryption, Decryption, Computer Security, Cryptography, DES, AES, Blowfish, RSA, CL-PKC, Securing Data, Hacking.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

A Survey on Various Attribute based Public Key Cryptography

A Public Key Encryption is a technique of encrypting the message using public keys so that the message is secure against various attacks. A Keyword based Public Key Encryption is a new way of providing security against various attacks. Although there are various keyword searches based public key encryption techniques are implemented. Here in this paper a survey of all the techniques based on Ke...

متن کامل

Survey of Various Encryption Techniques for Audio Data

The growth rate of the internet exceeds day by day. With the fast growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a major role in the field of network security. There are many encryption techniques available currently to secure the data. In this review paper we will have an overview of encryption techniques. This paper mainly focuses ...

متن کامل

A Survey on Various Data Hiding Techniques and their Comparative Analysis

With the explosive growth of internet and the fast communication techniques in recent years the security and the confidentiality of the sensitive data has become of prime and supreme importance and concern. To protect this data from unauthorized access and tampering various methods for data hiding like cryptography, hashing, authentication have been developed and are in practice today. In this ...

متن کامل

Survey On Encryption Algorithm Based On Chaos Theory And DNA Cryptography

DNA Cryptography is a new born cryptography that overcomes the difficulties of traditional cryptography due to its extraordinary information density inherent in DNA molecules, exceptional energy efficiency and vast parallelism. A lot of work have been done in this area based on different techniques like –DNA synthesis, PCR, Electrophoresis etc. In this paper various trends in DNA Cryptography a...

متن کامل

A Survey on Principal Aspects of Secure Image Transmission

This paper is a review on the aspects and approaches of design an image cryptosystem. First a general introduction given for cryptography and images encryption and followed by different techniques in image encryption and related works for each technique surveyed. Finally, general security analysis methods for encrypted images are mentioned. Keywords—Image, cryptography, encryption, security, an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016