A Review on Classical and Modern Encryption Techniques
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 12, Issue 4
Abstract
Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Often the objectives of information security cannot solely be achieved through mathematical algorithms and protocols alone, but require procedural techniques and abidance of laws to achieve the desired result. For example, privacy of letters is provided by sealed envelopes delivered by an accepted mail service. The physical security of the envelope is, for practical necessity, limited and so laws are enacted which make it a criminal offense to open mail for which one is not authorized. It is sometimes the case that security is achieved not through the information itself but through the physical document recording it. For example, paper currency requires special inks and material to prevent counterfeiting. Achieving information security in an electronic society requires a vast array of technical and legal skills. There is, however, no guarantee that all of the information security objectives deemed necessary can be adequately met. The technical means is provided through cryptography [1]. In this paper study of various classical and modern encryption techniques has carried out. Also a review of research and development of encryption techniques has done. Finally we compared the results and concluded that which technique is superior.
Authors and Affiliations
Ali Mir Arif Mir Asif , Shaikh Abdul Hannan
Comparative Study of Pre Engineered and Conventional Industrial Building
Long span, Column free structures are the most essential in any type of industrial structures and Pre Engineered Buildings (PEB) fulfil this requirement along with reduced time and cost as compared to conventional struct...
Analysis of Possible Attack on AODV Protocol in MANET
Mobile Ad Hoc Networks (MANETs) consist of wireless mobile nodes which coordinate with each other to form temporary network without its pre-existing infrastructure. AODV is popular Ad-hoc distance vector routing reactive...
Design, Modeling and Analysis of Helical Gear According Bending Strength Using AGMA and ANSYS
there are two kinds of stresses in gear teeth, root bending stresses and tooth contact stresses. These two stresses results in the failure of gear teeth, root bending stress results in fatigue fracture and contact stress...
A Novel Approach for Character Recognition
“Optical Character Recognition”, abbreviated as OCR has become a very important aspect of life in today’s world especially in Computer vision applications, and also in the field of Robotics. Our basic objective is to dev...
Design And Implementation Of Luo Converter For Electric Vehicle Applications
This paper proposes the stable and ripple free output voltage from the design of developed Dc-Dc converter topology. Dc voltage provided by battery contains high voltage ripples and it is not constant enough voltage, t...