A Survey on Generation and Evolution of Various Cryptographic Techniques

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 01 | Jan -2017

p-ISSN: 2395-0072

www.irjet.net

A Survey on Generation and Evolution of Various Cryptographic Techniques Shashi Gautam1, Shubha Mishra2, Dr. Manish Shrivastava3 1PG

Scholar in Information Technology, LNCT Bhopal, M.P, India Professor in Information Technology, LNCT Bhopal, M.P, India 3Professor and Head of Information Technology, LNCT Bhopal, M.P, India 2Asst.

---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - The evolution of wireless transmission in this

modern era, daily touches the new heights of technology. There are so many eyes on the data transmitted over the network. This flow of data over the network requires some sort of security in terms of confidentiality, secrecy, authenticity etc. cryptography is one of the techniques used to provide security to the data flowing over the network by encryption and decryption. Till now, several cryptosystems have been designed and still they are introducing. So far, a large number of encryption/decryption techniques have been implemented and proposed. In this paper we have surveyed some symmetric key cryptographic techniques; we made study of analysis and basic comparison among them. This paper lists some basic features, advantages, disadvantages of various symmetric cryptographic algorithms. Key Words: Encryption, Decryption, Security, BCD, Binary Shifts, BLOWFISH, DES, 3DES

   

1.2 Types of Cryptography: 

1. INTRODUCTION This era's civilization is highly dependent upon the internet and its application for their part of life such as communication, transmission of data, files, videos etc. Hence these data are more vulnerable of duplicating of data and redistribution of these data by unauthorized persons. Therefore these data must requires protection while flows over the networks. Cryptography is one of the techniques used to reach the some security essentials. In this era of communication, the encryption/decryption of data plays an important role for securing the data in mainly in wireless internet information systems. There are many cryptosystems have been introduced to provide protection and confidentiality from unauthorized use. Everyday new method for encryption/decryption techniques is discovered.

Integrity: This ensures the participants of communicator that their transmission will be intact and will not be modified on the air. Access Control: This function determines that who is permitted to access the restricted resources. Confidentiality: This principle specifies that only the participants of the communication must be able to access and receive the message. Non-Repudiation: Non-Repudiation principle does not allow the sender of the message to refute the claim of not sending the messages.

Symmetric key cryptography: In symmetric cryptography a same key is used for both encryption and decryption, therefore it needs some mechanism to keep the key secret. Therefore this type of cryptography is also called secret key cryptography. DES, Triple DES, AES, RC5 and etc. are the exhibition of symmetric key cryptography. Asymmetric key cryptography: In the asymmetric key cryptography, there are two keys are used, one for encryption and other for decryption. Keeps encryption key public know to everyone but decryption key private. Therefore this type cryptography also known as public key cryptography. RSA, Elliptic Curve etc. are the exhibition of asymmetric key cryptography.

1.1 Purpose of cryptography: 

Authentication: An authentication is the cryptographic function of identifying the connecting entities by the internetwork. This is used when two or more entities try to start communication. Authorization: This function specifies the access rights to the resources.

© 2017, IRJET

|

Impact Factor value: 5.181

|

Fig 1: Classification of Cryptography

This paper analyzes some of these recent existing encryption techniques and their security issues. The performance of all these techniques are studied and discussed in this paper. ISO 9001:2008 Certified Journal

|

Page 892


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.