B. Ghosh, Rohit Aich, Arka Khag, S. Nayak, Prashant Kumar
{"title":"密码学","authors":"B. Ghosh, Rohit Aich, Arka Khag, S. Nayak, Prashant Kumar","doi":"10.1002/9781119533245.ch13","DOIUrl":null,"url":null,"abstract":"The word cryptography was coined from two Greek words ‘Krypto’, meaning hidden and ‘graphein’ meaning writing. Thus, cryptography means hidden writing. Cryptography is the method of protecting important data and information from third parties called adversaries\n or the public. It is also known as encryption. Modern cryptography is basically based on Mathematics and Computer science. The roots of cryptography are found in Roman and Egyptian civilizations. Hieroglyph is the oldest cryptographic technique. Based on security needs and threats, various\n cryptographic methods such as symmetric key cryptography, public key, private key, microdots, etc are adopted [1]. It is a two step process; encryption and decryption. The encryption process uses a cipher (code) in order to encrypt plaintext and convert it into ciphertext. Decryption is the\n opposite of encryption that is to decode the encrypted message or information. Cryptography was used extensively in the American Revolutionary War, the First World War and the Second World War. For example if the code was ‘CVVCEM’ then it would mean ‘ATTACK’. The initials\n of each letter is shifted by two places. This paper is basically a survey paper and we have studied the importance, features, advantages, and disadvantages and authenticated on the topic cryptography. Note: This paper is a REVIEW PAPER.","PeriodicalId":270881,"journal":{"name":"Journal of Mathematical Sciences & Computational Mathematics","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"CRYPTOGRAPHY\",\"authors\":\"B. Ghosh, Rohit Aich, Arka Khag, S. Nayak, Prashant Kumar\",\"doi\":\"10.1002/9781119533245.ch13\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The word cryptography was coined from two Greek words ‘Krypto’, meaning hidden and ‘graphein’ meaning writing. Thus, cryptography means hidden writing. Cryptography is the method of protecting important data and information from third parties called adversaries\\n or the public. It is also known as encryption. Modern cryptography is basically based on Mathematics and Computer science. The roots of cryptography are found in Roman and Egyptian civilizations. Hieroglyph is the oldest cryptographic technique. Based on security needs and threats, various\\n cryptographic methods such as symmetric key cryptography, public key, private key, microdots, etc are adopted [1]. It is a two step process; encryption and decryption. The encryption process uses a cipher (code) in order to encrypt plaintext and convert it into ciphertext. Decryption is the\\n opposite of encryption that is to decode the encrypted message or information. Cryptography was used extensively in the American Revolutionary War, the First World War and the Second World War. For example if the code was ‘CVVCEM’ then it would mean ‘ATTACK’. The initials\\n of each letter is shifted by two places. This paper is basically a survey paper and we have studied the importance, features, advantages, and disadvantages and authenticated on the topic cryptography. Note: This paper is a REVIEW PAPER.\",\"PeriodicalId\":270881,\"journal\":{\"name\":\"Journal of Mathematical Sciences & Computational Mathematics\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Mathematical Sciences & Computational Mathematics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/9781119533245.ch13\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Mathematical Sciences & Computational Mathematics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/9781119533245.ch13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The word cryptography was coined from two Greek words ‘Krypto’, meaning hidden and ‘graphein’ meaning writing. Thus, cryptography means hidden writing. Cryptography is the method of protecting important data and information from third parties called adversaries
or the public. It is also known as encryption. Modern cryptography is basically based on Mathematics and Computer science. The roots of cryptography are found in Roman and Egyptian civilizations. Hieroglyph is the oldest cryptographic technique. Based on security needs and threats, various
cryptographic methods such as symmetric key cryptography, public key, private key, microdots, etc are adopted [1]. It is a two step process; encryption and decryption. The encryption process uses a cipher (code) in order to encrypt plaintext and convert it into ciphertext. Decryption is the
opposite of encryption that is to decode the encrypted message or information. Cryptography was used extensively in the American Revolutionary War, the First World War and the Second World War. For example if the code was ‘CVVCEM’ then it would mean ‘ATTACK’. The initials
of each letter is shifted by two places. This paper is basically a survey paper and we have studied the importance, features, advantages, and disadvantages and authenticated on the topic cryptography. Note: This paper is a REVIEW PAPER.