A study: cryptology techniques and methodologies
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniq...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
International Journal of Science and Research
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/38392/1/A_Study_Cryptology_Techniques_and_Methodologies.pdf http://irep.iium.edu.my/38392/ http://www.ijsr.net/archive/v2i12/MDIwMTM2NTM=.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.38392 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.383922014-09-24T08:50:21Z http://irep.iium.edu.my/38392/ A study: cryptology techniques and methodologies Safitri, Cutifa Shoukat Ali, Haroon Ibrahim, Jamaludin T Technology (General) Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and ‘bullet proof’ they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is. International Journal of Science and Research 2013-12 Article REM application/pdf en http://irep.iium.edu.my/38392/1/A_Study_Cryptology_Techniques_and_Methodologies.pdf Safitri, Cutifa and Shoukat Ali, Haroon and Ibrahim, Jamaludin (2013) A study: cryptology techniques and methodologies. International Journal of Science and Research (IJSR), 2 (12). pp. 352-357. ISSN 2319-7064 http://www.ijsr.net/archive/v2i12/MDIwMTM2NTM=.pdf |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Safitri, Cutifa Shoukat Ali, Haroon Ibrahim, Jamaludin A study: cryptology techniques and methodologies |
description |
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and ‘bullet proof’ they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is. |
format |
Article |
author |
Safitri, Cutifa Shoukat Ali, Haroon Ibrahim, Jamaludin |
author_facet |
Safitri, Cutifa Shoukat Ali, Haroon Ibrahim, Jamaludin |
author_sort |
Safitri, Cutifa |
title |
A study: cryptology techniques and methodologies |
title_short |
A study: cryptology techniques and methodologies |
title_full |
A study: cryptology techniques and methodologies |
title_fullStr |
A study: cryptology techniques and methodologies |
title_full_unstemmed |
A study: cryptology techniques and methodologies |
title_sort |
study: cryptology techniques and methodologies |
publisher |
International Journal of Science and Research |
publishDate |
2013 |
url |
http://irep.iium.edu.my/38392/1/A_Study_Cryptology_Techniques_and_Methodologies.pdf http://irep.iium.edu.my/38392/ http://www.ijsr.net/archive/v2i12/MDIwMTM2NTM=.pdf |
_version_ |
1643611414869311488 |
score |
13.211869 |