SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 6 Issue 6, September-October 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD52232 | Volume – 6 | Issue – 6 | September-October 2022 Page 2030
Cryptography Methodologies
Devendra Kumar Meena1
, Dr. A. Rengarajan2
1
MCA Scholar, 2
Professor,
1,2
School of CS and IT, Dept of MCA, Jain (Deemed-to-be University), Bangalore, Karnataka, India
ABSTRACT
From the last several years data and Security has become a main
concern for anyone who connected to the internet. Data security
prevents any modification in our data and ensures that our data is
only accessible by the intended receiver. We have redeveloped
methods and algorithm to achieve this level of security.
Cryptography Is a technique for securing data, information and
communication using some algorithms that make the data unreadable
for human eye. We can decrypt the data using algorithm that is
predefined by the sender.
KEYWORDS: Mothers, quality of life, normal vaginal delivery,
caesarean section
How to cite this paper: Devendra
Kumar Meena | Dr. A. Rengarajan
"Cryptography Methodologies"
Published in
International Journal
of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-6 |
Issue-6, October
2022, pp.2030-2032, URL:
www.ijtsrd.com/papers/ijtsrd52232.pdf
Copyright © 2022 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an
Open Access article
distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
Objective
To understand the concept and techniques of
cryptography used in communication, information
and data transfer.
Literature Review
What is cryptography, how cryptography works,
where we use the concept of cryptography, how
algorithm is used in securing the data, working of
AES and DES algorithm.
Introduction
Cryptographyis a technique to achieve confidentiality
of data. Cryptography term has a specific meaning in
Greek: “secret writing”. Nowadays the privacy of
organizations and individuals is provided by
cryptography and making sure that data or
information sent is secure in a way that the authorized
receiver can access this information. Cryptography is
very old technique, back to 2000 B.C. Egyptians used
“secret” hieroglyphics.
Figure 1: Cryptography
We need to know something about following
terminology before start with cryptography:
Encryption: encryption process converts a plain text
into a cipher text.
Decryption: decryption is inverse process of
encryption; it converts a cipher text into a plain text
Cipher: Cipher is an algorithm for encrypting and
decrypting data.
Classification of Cryptography
Figure 2: Classification of Cryptography
IJTSRD52232
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD52232 | Volume – 6 | Issue – 6 | September-October 2022 Page 2031
Symmetric Key Cryptography
Symmetric key cryptography is a type of encryption
scheme in which the sender and receiver of a message
share a single, common key that is used for both
encryption and decryption the message. Symmetric
key cryptography also known as private-kay, single-
key and secret-key cryptography. Data Encryptions
Standards (DES) is the most popular symmetric key
system. Symmetric key cryptography Mostly used in
banking application where personal information's
need to be encrypted. Symmetric cryptography helps
in detecting bank frauds. Symmetric key
cryptography also helps in protecting data that is not
in transit and dress on servers and data centers.
Figure 3: Symmetric Key Cryptography
Asymmetric Key cryptography
Asymmetric key cryptography also known as public-
key cryptography. Two different keys are used in
asymmetric key cryptography. Private key is used for
encrypting the data and public key is used for
decrypting the same data.
Each user has two keys (private key and pubic key) in
asymmetric key cryptography. Both keys (private and
public) are mathematically related. Public key and
private key together are called the key pair. The
public key is available for everyone but the private
key is not available for everyone. Private keyis secret
key. Both private and public key are required to
perform an operation e.g., data encrypted with the
public key is decrypted with the private key.
Encrypting the data with the private key creates a
digital signature. This digital signature ensures the
message has come from stated sender.
Figure 4: Asymmetric Key Cryptography
Classical Cryptography
1. Transposition Cipher
Transposition cipher is a cryptographic algorithm. In
this algorithm the order of alphabets in the pain text is
rearranged to form of a plaintext. In this algorithm
process the actual plain text alphabets are not
included.
An example for a transposition cipher algorithm is
columnar transposition cipher where each character in
the pain text is written horizontally with the specified
alphabet width. The cipher code is written vertically,
which creates an entirely different cipher text.
The plain text hello devendra, and let us apply the
simple columnar transposition technique as shown
below.
The plain text characters are placed horizontally and
the cipher text is created with vertical format as:
hoeaedn led lvr . The receiver has to use the same
table to decrypt the cipher code to plain text.
2. Substitution Cipher
Substitution cipher is a cryptographic algorithm. It is
the most commonly used cipher. It includes an
algorithm of substituting every plain text character for
every cipher text character. In this algorithm process,
alphabets are jumbled in comparison with Caesar
cipher algorithm.
Keys for a simple substitution cipher usually consists
of 26 letters. An example key is -
plain alphabet: abcdefghijklmnopqrstuvwxyz
cipher alphabet: pqowieurytalskdjfhgmznxbcv
An example using the above key
Plaintext: hello devendra Ciphertext: rilld winikwhp
Modern Cryptography
1. Stream cipher
Stream cipher encrypt one bite at a time. Stream
ciphers operate on pseudorandom bits generated from
the key, and the plaintext is encrypted by XORing
both the plaintext and the pseudorandom bits.
Stream Cipher follows the sequence of pseudorandom
number stream. One of the best benefits of following
stream cipher is to make cryptanalysis more difficult,
so the number of bits chosen in the Keystream must
be long in order to make cryptanalysis more difficult.
h e l l
o d e v
e n d r
a
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD52232 | Volume – 6 | Issue – 6 | September-October 2022 Page 2032
The longer key achieved the stronger security and it
helps in preventing any attack.
2. Block Cipher
Block cipher consists an algorithm for encryption and
another algorithm for decryption. Block cipher takes a
block of plaintext and generates a block of ciphertext,
generally of same size. Block size is fixed in given
scheme.
Pseudorandom permutation is used in order to make
the block cipher more secure. That means if the key is
kept secret, the attacker will not be able to decrypt the
block cipher and compute the output from any input.
In a block cipher two values are generally referred to
the size of the block and the size of the key. Most of
the block ciphers use a 64-bit block or a 128-bit
block.
Figure 5: Block Cipher Diagram
CONCLUSION
Cryptography plays a important and critical role in
achieving the primary aims of security goals such as
authentication, integrity, confidentiality, etc.
Cryptographic algorithms are developed in order to
successfully achieve these goals. Cryptography has
the important purpose of providing strong, reliable,
and robust data and network security. In this paper,
we demonstrated a review of some of the research
that has been conducted in the field of cryptography
as well as of how the various algorithms used in
cryptography for different security purposes work.
Cryptography will continue to emerge with business
plans and IT in regard to protecting financial,
personal, ecommerce, and medical data and providing
a respectable level of privacy.
REFERENCES
[1] Abdalbasit Mohammed Qadir and Nurhayat
Varol, A Review Paper on Cryptography,
https://www.researchgate.net/publication/33441
8542_A_Review_Paper_on_Cryptography, 23
October 2019
[2] Yahia Alemami, Mohamad Afendee Mohamed,
Saleh Atiewi, Research on Various
CryptographyTechniques, International Journal
of Recent Technologyand Engineering (IJRTE)
ISSN: 2277-3878, Volume-8, Issue-2S3, July
2019
[3] Vipin Kumar Gupta, A Literature Review on
The Concept of Cryptography and RSA
Algorithm
[4] https://www.researchgate.net/publication/36017
5324_A_LITERATURE_REVIEW_ON_THE_
CONCEPT_OF_CRYPTOGRAPHY_AND_RS
A_ALGORITHM, International Journal of
Advance and Innovative Research, IISN:2394-
7780, volume 9, issue- march 2022
[5] https://www.tutorialspoint.com/cryptography/
[6] https://www.geeksforgeeks.org/cryptography-
and-its-types/

More Related Content

Similar to Cryptography Methodologies

Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computingijtsrd
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Techniqueijsrd.com
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444IJRAT
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic TechniquesStacy Taylor
 

Similar to Cryptography Methodologies (20)

Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

Cryptography Methodologies

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 6 Issue 6, September-October 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD52232 | Volume – 6 | Issue – 6 | September-October 2022 Page 2030 Cryptography Methodologies Devendra Kumar Meena1 , Dr. A. Rengarajan2 1 MCA Scholar, 2 Professor, 1,2 School of CS and IT, Dept of MCA, Jain (Deemed-to-be University), Bangalore, Karnataka, India ABSTRACT From the last several years data and Security has become a main concern for anyone who connected to the internet. Data security prevents any modification in our data and ensures that our data is only accessible by the intended receiver. We have redeveloped methods and algorithm to achieve this level of security. Cryptography Is a technique for securing data, information and communication using some algorithms that make the data unreadable for human eye. We can decrypt the data using algorithm that is predefined by the sender. KEYWORDS: Mothers, quality of life, normal vaginal delivery, caesarean section How to cite this paper: Devendra Kumar Meena | Dr. A. Rengarajan "Cryptography Methodologies" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-6 | Issue-6, October 2022, pp.2030-2032, URL: www.ijtsrd.com/papers/ijtsrd52232.pdf Copyright © 2022 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) Objective To understand the concept and techniques of cryptography used in communication, information and data transfer. Literature Review What is cryptography, how cryptography works, where we use the concept of cryptography, how algorithm is used in securing the data, working of AES and DES algorithm. Introduction Cryptographyis a technique to achieve confidentiality of data. Cryptography term has a specific meaning in Greek: “secret writing”. Nowadays the privacy of organizations and individuals is provided by cryptography and making sure that data or information sent is secure in a way that the authorized receiver can access this information. Cryptography is very old technique, back to 2000 B.C. Egyptians used “secret” hieroglyphics. Figure 1: Cryptography We need to know something about following terminology before start with cryptography: Encryption: encryption process converts a plain text into a cipher text. Decryption: decryption is inverse process of encryption; it converts a cipher text into a plain text Cipher: Cipher is an algorithm for encrypting and decrypting data. Classification of Cryptography Figure 2: Classification of Cryptography IJTSRD52232
  • 2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD52232 | Volume – 6 | Issue – 6 | September-October 2022 Page 2031 Symmetric Key Cryptography Symmetric key cryptography is a type of encryption scheme in which the sender and receiver of a message share a single, common key that is used for both encryption and decryption the message. Symmetric key cryptography also known as private-kay, single- key and secret-key cryptography. Data Encryptions Standards (DES) is the most popular symmetric key system. Symmetric key cryptography Mostly used in banking application where personal information's need to be encrypted. Symmetric cryptography helps in detecting bank frauds. Symmetric key cryptography also helps in protecting data that is not in transit and dress on servers and data centers. Figure 3: Symmetric Key Cryptography Asymmetric Key cryptography Asymmetric key cryptography also known as public- key cryptography. Two different keys are used in asymmetric key cryptography. Private key is used for encrypting the data and public key is used for decrypting the same data. Each user has two keys (private key and pubic key) in asymmetric key cryptography. Both keys (private and public) are mathematically related. Public key and private key together are called the key pair. The public key is available for everyone but the private key is not available for everyone. Private keyis secret key. Both private and public key are required to perform an operation e.g., data encrypted with the public key is decrypted with the private key. Encrypting the data with the private key creates a digital signature. This digital signature ensures the message has come from stated sender. Figure 4: Asymmetric Key Cryptography Classical Cryptography 1. Transposition Cipher Transposition cipher is a cryptographic algorithm. In this algorithm the order of alphabets in the pain text is rearranged to form of a plaintext. In this algorithm process the actual plain text alphabets are not included. An example for a transposition cipher algorithm is columnar transposition cipher where each character in the pain text is written horizontally with the specified alphabet width. The cipher code is written vertically, which creates an entirely different cipher text. The plain text hello devendra, and let us apply the simple columnar transposition technique as shown below. The plain text characters are placed horizontally and the cipher text is created with vertical format as: hoeaedn led lvr . The receiver has to use the same table to decrypt the cipher code to plain text. 2. Substitution Cipher Substitution cipher is a cryptographic algorithm. It is the most commonly used cipher. It includes an algorithm of substituting every plain text character for every cipher text character. In this algorithm process, alphabets are jumbled in comparison with Caesar cipher algorithm. Keys for a simple substitution cipher usually consists of 26 letters. An example key is - plain alphabet: abcdefghijklmnopqrstuvwxyz cipher alphabet: pqowieurytalskdjfhgmznxbcv An example using the above key Plaintext: hello devendra Ciphertext: rilld winikwhp Modern Cryptography 1. Stream cipher Stream cipher encrypt one bite at a time. Stream ciphers operate on pseudorandom bits generated from the key, and the plaintext is encrypted by XORing both the plaintext and the pseudorandom bits. Stream Cipher follows the sequence of pseudorandom number stream. One of the best benefits of following stream cipher is to make cryptanalysis more difficult, so the number of bits chosen in the Keystream must be long in order to make cryptanalysis more difficult. h e l l o d e v e n d r a
  • 3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD52232 | Volume – 6 | Issue – 6 | September-October 2022 Page 2032 The longer key achieved the stronger security and it helps in preventing any attack. 2. Block Cipher Block cipher consists an algorithm for encryption and another algorithm for decryption. Block cipher takes a block of plaintext and generates a block of ciphertext, generally of same size. Block size is fixed in given scheme. Pseudorandom permutation is used in order to make the block cipher more secure. That means if the key is kept secret, the attacker will not be able to decrypt the block cipher and compute the output from any input. In a block cipher two values are generally referred to the size of the block and the size of the key. Most of the block ciphers use a 64-bit block or a 128-bit block. Figure 5: Block Cipher Diagram CONCLUSION Cryptography plays a important and critical role in achieving the primary aims of security goals such as authentication, integrity, confidentiality, etc. Cryptographic algorithms are developed in order to successfully achieve these goals. Cryptography has the important purpose of providing strong, reliable, and robust data and network security. In this paper, we demonstrated a review of some of the research that has been conducted in the field of cryptography as well as of how the various algorithms used in cryptography for different security purposes work. Cryptography will continue to emerge with business plans and IT in regard to protecting financial, personal, ecommerce, and medical data and providing a respectable level of privacy. REFERENCES [1] Abdalbasit Mohammed Qadir and Nurhayat Varol, A Review Paper on Cryptography, https://www.researchgate.net/publication/33441 8542_A_Review_Paper_on_Cryptography, 23 October 2019 [2] Yahia Alemami, Mohamad Afendee Mohamed, Saleh Atiewi, Research on Various CryptographyTechniques, International Journal of Recent Technologyand Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-2S3, July 2019 [3] Vipin Kumar Gupta, A Literature Review on The Concept of Cryptography and RSA Algorithm [4] https://www.researchgate.net/publication/36017 5324_A_LITERATURE_REVIEW_ON_THE_ CONCEPT_OF_CRYPTOGRAPHY_AND_RS A_ALGORITHM, International Journal of Advance and Innovative Research, IISN:2394- 7780, volume 9, issue- march 2022 [5] https://www.tutorialspoint.com/cryptography/ [6] https://www.geeksforgeeks.org/cryptography- and-its-types/