Research on Various Cryptography Techniques

Bharati A. Patil, Prajakta R. Toke, Sharyu S. Naiknavare
{"title":"Research on Various Cryptography Techniques","authors":"Bharati A. Patil, Prajakta R. Toke, Sharyu S. Naiknavare","doi":"10.32628/cseit2410290","DOIUrl":null,"url":null,"abstract":"Cryptography is utilized to make secure data transmission over networks. The algorithm called for cryptography should meet the conditions of authentication, confidentiality, integrity and non-repudiation. Cryptography is a technique used from decenniums to secure and forfend the information and send the data from one place to another without the trepidation of having been read out by some unauthorized and unauthenticated denotes. Several ways has been developed in this field to make the information more secure and evade trespassing. However these methods may have some loopholes or shortcoming which leads to the leakage of information and thus raising a question of information security. The cryptographic technique is utilized not only to provide the security but additionally it deals with data integrity, confidentiality and non-repudiation issues. To safeguard data during transmission or storage, sundry algorithms and methods have been developed in the field of security. A wide range of cryptography approaches are employed, each with its own set of strengths and inhibitions that are acclimated to provide data security. Cryptography can be defined as techniques that cipher data, depending on categorical algorithms that make the data unreadable to the human ocular perceiver unless decrypted by algorithms that are predefined by the sender. It encrypts data utilizing a set of algorithms such as symmetric and asymmetric algorithms. These encryption methods vary in terms of vitality, celerity, and utilization of resources (CPU utilization, recollection, and power). It is utilized to bulwark personal identifiable information (PII) and other confidential data, authenticate identities, avert document tampering, and build trust between servers. Cryptography is one of the most paramount techniques utilized by digital businesses to safeguard the systems that store their most valuable asset – data – whether it is at rest or in kinetic Customer PII, employee PII, perspicacious property, company strategies, and any other confidential information are examples of data. As a result, cryptography is a vital infrastructure, as the aegis of sensitive data increasingly relies on cryptographic solutions. In this paper I have discussed various cryptographic techniques and the inhibitions of those techniques as well. Some cryptographic algorithms are briefly described and their impact on the information is additionally mentioned.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"79 18","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32628/cseit2410290","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cryptography is utilized to make secure data transmission over networks. The algorithm called for cryptography should meet the conditions of authentication, confidentiality, integrity and non-repudiation. Cryptography is a technique used from decenniums to secure and forfend the information and send the data from one place to another without the trepidation of having been read out by some unauthorized and unauthenticated denotes. Several ways has been developed in this field to make the information more secure and evade trespassing. However these methods may have some loopholes or shortcoming which leads to the leakage of information and thus raising a question of information security. The cryptographic technique is utilized not only to provide the security but additionally it deals with data integrity, confidentiality and non-repudiation issues. To safeguard data during transmission or storage, sundry algorithms and methods have been developed in the field of security. A wide range of cryptography approaches are employed, each with its own set of strengths and inhibitions that are acclimated to provide data security. Cryptography can be defined as techniques that cipher data, depending on categorical algorithms that make the data unreadable to the human ocular perceiver unless decrypted by algorithms that are predefined by the sender. It encrypts data utilizing a set of algorithms such as symmetric and asymmetric algorithms. These encryption methods vary in terms of vitality, celerity, and utilization of resources (CPU utilization, recollection, and power). It is utilized to bulwark personal identifiable information (PII) and other confidential data, authenticate identities, avert document tampering, and build trust between servers. Cryptography is one of the most paramount techniques utilized by digital businesses to safeguard the systems that store their most valuable asset – data – whether it is at rest or in kinetic Customer PII, employee PII, perspicacious property, company strategies, and any other confidential information are examples of data. As a result, cryptography is a vital infrastructure, as the aegis of sensitive data increasingly relies on cryptographic solutions. In this paper I have discussed various cryptographic techniques and the inhibitions of those techniques as well. Some cryptographic algorithms are briefly described and their impact on the information is additionally mentioned.
各种密码学技术的研究
加密技术用于确保网络数据传输的安全性。加密算法应满足认证、保密、完整和不可抵赖的条件。密码学是一种从几十年前就开始使用的技术,用于确保信息的安全和保密,并将数据从一个地方发送到另一个地方,而不必担心被未经授权和认证的人读取。在这一领域已经开发出了多种方法,使信息更加安全,并避免非法侵入。然而,这些方法可能存在一些漏洞或缺陷,导致信息泄露,从而引发信息安全问题。加密技术的使用不仅是为了提供安全性,而且还涉及数据完整性、保密性和不可否认性问题。为了保障数据在传输或存储过程中的安全,在安全领域开发了各种算法和方法。我们采用了多种密码学方法,每种方法都有自己的优势和不足,以确保数据安全。密码学可定义为对数据进行加密的技术,它依赖于分类算法,除非通过发送方预先定义的算法进行解密,否则人类肉眼无法读取数据。它利用对称算法和非对称算法等一系列算法对数据进行加密。这些加密方法在活力、速度和资源利用率(CPU 利用率、内存和功率)方面各不相同。加密技术被用来保护个人身份信息(PII)和其他机密数据、验证身份、避免文件被篡改以及在服务器之间建立信任。加密技术是数字企业用来保护存储其最宝贵资产--数据--的系统的最重要技术之一,无论是静态数据还是动态数据,客户的 PII、员工的 PII、机密财产、公司战略和任何其他机密信息都是数据的例子。因此,加密技术是一种重要的基础设施,因为敏感数据的保护越来越依赖于加密解决方案。在本文中,我讨论了各种加密技术以及这些技术的局限性。本文简要介绍了一些加密算法,并提到了它们对信息的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信