International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 80    Submit Your Rating     Cite This   Download        Certificate

EMERGING CRYPTOGRAPHIC TECHNIQUES

    3 Author(s):  JYOTI , POONAM , TEENA SUNEJA

Vol -  6, Issue- 8 ,         Page(s) : 6 - 14  (2015 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Cryptography and encryption have been used for secure communication for thousands of years. Cryptography is about communication in the presence of an adversary. To carry sensitive information, such as military or financial data, a system must be able to secure privacy. Satellite and other wireless media can not be protected from the unauthorized access a more practical way to protect information is to alter it so that only an authorized receiver can understand it. This method is used today is cryptography. Oddly enough, cryptography is the art of secret writing. More generally, people think of cryptography as the art of mangling information into apparent unintelligibility in a manner allowing a secret method of unmangling. A more practical way to protect information is to alter it so that only an authorized receiver can understand it. This method used today is called the cryptography.

  1. Cryptographic Techniques by School of Software, Sun Yat-sen University
  2. Cryptographic Techniques for Physical Security by Author: Daniel A. Nagy,ELTECRYPT Research Group,  Supported by the National Office for Research and Technology (NKTH) in the framework of Jedlik Ányos Program with number of tender ,NKFP2-00027/2005.
  3. PAST, PRESENT, AND FUTURE METHODS OF CRYPTOGRAPHY AND DATA ENCRYPTION by Nicholas G. McDonald
  4. Data Communications and Networking by Forouzan
  5. Cryptographic communication and authentication                                   Paul Krzyzanowski
  6. Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac
  7. The Basics of Cryptography by Julius Caesar
  8. Cryptography by Nigel Sm
  9. Cryptography by G. JULIUS CAESAR, JOHN F. KENNEDY
  10. William Stallings, Cryptography and Network Security: Principles and Practice (5th Edition), Prentice Hall 2010

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details