Preview

Cryptography

Powerful Essays
Open Document
Open Document
2044 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cryptography
International Journal of Science and Technology Volume 1 No. 3, March, 2012

A Survey on the Applications of Cryptography
Shivangi Goyal
University School Of Information Technology Guru Gobind Singh Indraprastha University 16-C, Dwarka, Delhi

ABSTRACT
This paper gives a brief summary of cryptography, where it is applied and its usage in various forms. Cryptography is a way of safeguarding the crucial data from unauthorized access. It has emerged as a secure means for transmission of information. It mainly helps in curbing intrusion from third party. It provides data confidentiality, integrity, electronic signatures, and advanced user authentication. The methods of cryptography use mathematics for securing the data (encryption and decryption).
Keywords: Cryptography, Data Confidentiality, Integrity, Electronic signatures, Authentication, Encryption, Decryption

1. INTRODUCTION
Information security plays a pivotal role during internet communication in today’s era of technology. It is tremendously important for people committing etransactions. For naïve people it may seem to be not that necessary orincreased security may provide comfort to paranoid people but the truth is that it is absolutely essential when communication is carried between tens of millions of people daily. There are various cryptography methods that provide a means for secure commerce and payment to private communications and protecting passwords. Cryptography is necessary for secure communications; it is not by itself sufficient. The reader of this paper will find variants of cryptography and their applications. This paper has two major purposes. The first is to provide some real examples of cryptography in use today. The second is to provide tabular summarization and conclusion. Curious readers should check out some of the web pages and pdf in the bibliography below for further detailed — and interesting! — background information.

There are different types of cryptography. There is a



References: [1] http://msdn.microsoft.com/en-us/library/92f9ye3s.asp [2] http://www.garykessler.net/library/crypto.html [3] http://en.wikipedia.org/wiki/Cryptography IJST © 2012 – IJST Publications UK. All rights reserved. 139 International Journal of Science and Technology (IJST) – Volume 1 No. 3, March, 2012 [4] http://csrc.nist.gov/publications/nistpubs/800-12/80012-html/chapter19.html [5] http://searchsecurity.techtarget.com/definition/authent ication [6] http://en.wikipedia.org/wiki/Authentication [7] http://en.wikipedia.org/wiki/Digital_signature#Digital _signatures_vs._ink_on_paper_signatures [8] http://searchsecurity.techtarget.com/definition/digitalsignature [9] https://tspace.library.utoronto.ca/bitstream/1807/1930 7/1/Zhao_Yi_200911_PhD_Thesis.pdf [10] http://www.academypublisher.com/proc/wisa09/paper s/wisa09p363.pdf [11] http://electronicsbus.com/?s=Application+Of+Crypto graphy+Include+Credit+Cards [12] http://en.wikipedia.org/wiki/Encrypting_File_System [13] http://technet.microsoft.com/en/us/library/cc700811.as px [14] https://developer.mozilla.org/en/Introduction_to_Publi c-Key_Cryptography [15] http://www.garykessler.net/library/crypto.html [16] http://www.ccavenue.com/content/faq_ecommerce.jsp [17] http://en.wikipedia.org/wiki/Quantum_cryptography [18] http://en.wikipedia.org/wiki/Quantum_key_distributio n [19] http://www.networkworld.com/news/2007/101007quantum-cryptography-secure-ballots.html [20] http://www.cki.au.dk/experiment/qrypto/doc/QuCrypt/ b92coding.html [21] http://www.networkworld.com/newsletters/optical/20 04/0419optical2.html [22] http://www.academypublisher.com/proc/wisa09/paper s/wisa09p363.pdf IJST © 2012 – IJST Publications UK. All rights reserved. 140

You May Also Find These Documents Helpful

  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    These components work together to allow communication using public key cryptography and symmetric keys for digital signatures, data encryption, and integrity.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Susan Wolfe was able to express why some people are not fully responsible for their actions by way of discussing the situation of JoJo, as well as comparing her hypothesis to the views expressed by Frankfurt-Watson-Taylor. She explained JoJo as being the son of an evil dictator who was heavily idolized by JoJo in his youth. Consequently, JoJo was conditioned to have his father’s behavior, and he eventually felt no remorse in sending people to be tortured or executed over trivial things. JoJo allows us to observe his desires as being executed from no outside manipulation Wolfe stated that it seems unreasonable for us to place full responsibility on JoJo for his conditioned beliefs. We can observe, though, that JoJo’s actions ultimately come…

    • 483 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Powerful Essays

    Tilborg, H. (2002). Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial. Kluwer Academic Publishers.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    This paper is intended to show the importance using a Public Key Infrastructure (PKI). PKI is a broad subject matter and is constantly evolving to meet the growing demands of the business world. This paper will address PKI at a relatively high-level and will not include details regarding the underlying cryptography (Weise, 2001). This paper will cover the history behind PKI, why we should us PKI, its purposes and functions how PKI works.…

    • 2320 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Public key infrastructure is becoming an integral and essential element of security these days. It provides highly secure enterprise systems in companies that provide large scale rankings of data that need to be encrypted to improve security levels. With the public key infrastructure, we want to retrieve digital certificates and set up practices, ways and policies to encrypt data. Provides access to secure data exchange or networking through networks and provides access to authentication and verification. We can refer to it as an infrastructure that distributes public keys. Data Center Basics (2003).…

    • 601 Words
    • 3 Pages
    Good Essays

Related Topics