International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 9 - Issue 4, April 2020 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Modern Cryptography - A Review

[Full Text]



Seetha. R, Mythili. N



Encryption, Decryption, Plaintext, Cipher text, Cryptanalysis, Data security.



Cryptography techniques involve message conveyance either in a secret form or in some hidden form. Cryptography finds it applications in almost all fields for secure data transfer. Looking into the history it is the military field which is very much influenced by secure data transfer and communication. Use of cryptography has spread its wings once digital communication stepped in. The thirst of data security increased when digital communication started using wireless medium for data transmission. It is therefore necessary to understand the basics and importance of cryptographic techniques for better, fast and efficient data transfer without any intrusion.



[1] Ruohonen,Keijo. Mathematical cryptology. LectureNotes, 2010, pp.1-138.
[2] Boneh, Dan, Victor Shoup. A graduate course in applied cryptography, Draft 0.2, 2015.
[3] Barreto, P. S. L. M., Vincent Rijmen. The Whirlpool hashing function. First open NESSIE Workshop, Leuven, Belgiu, Vol. 13, 2000, pp.14.
[4] Stinson, Douglas R. Cryptography: theory and practice. Chapman and Hall/CRC, 2005.
[5] Singh S. The code book: the science of secrecy from ancient Egypt to quantum cryptography, Anchor, 2000.
[6] Nicholas GM, McDonald G. Past, present, and future methods of cryptography and data encryption. Department of Electrical and Computer Engineering University of Utah. 2015.
[7] Burnett, Steve, Stephen Paine. The RSA security's official guide to cryptography. McGraw-Hill, Inc., 2001.
[8] R. Rivest, A. Shamir, L. Adleman. A method for obtaining digital signatures and public-key cryptosystems, ACM, Vol 21, 1978, No 2, pp. 120–126.
[9] Diffie, Whitfield, Martin Hellman. New directions in cryptography, IEEE transactions on Information Theory, Vol 22, 1976, No 6, pp. 644-654.
[10] ElGamal, Taher. A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE transactions on information theory, Vol 31, 1985, No 4, pp. 469-472.
[11] Rabin, Michael O. Digitalized signatures and public-key functions as intractable as factorization, Massachusetts Inst of Tech Cambridge Lab for Computer Science, 1979.
[12] Nyberg K, Rueppel RA. Message recovery for signature schemes based on the discrete logarithm problem, InWorkshop on the Theory and Application of of Cryptographic Techniques Springer, Berlin, Heidelberg, 1994, pp. 182-193.
[13] Schnorr, Claus-Peter. Efficient signature generation by smart cards, Journal of cryptology Vol 4, 1991, No 3, pp. 161-174.
[14] Lauter, Kristin. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless communications, vol 11, 2004, No 1, pp. 62-67.
[15] Hughes, Richard J., Douglas M. Alde, P. Dyer, Gabriel G. Luther, George L. Morgan, M. Schauer. Quantum cryptography, Contemporary Physics, Vol 36, 1995, No 3, pp. 149-163.
[16] Schneier, Bruce. Description of a new variable-length key, 64-bit block cipher (Blowfish), In International Workshop on Fast Software Encryption, Springer, Berlin, Heidelberg, 1993, pp. 191-204.
[17] Thakur, Jawahar, Nagesh Kumar. DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis, International journal of emerging technology and advanced engineering, Vol 1, 2011, No. 2, pp. 6-12.
[18] Daemen J, Rijmen V. The design of Rijndael: AES-the advanced encryption standard, Springer Science & Business Media, 2013.
[19] Leong, M.P., Cheung, O.Y., Tsoi, K.H. Leong, P.H.W. A bit-serial implementation of the international data encryption algorithm IDEA, In Proceedings 2000 IEEE Symposium on Field-Programmable Custom Computing Machines, IEEE, 2000, pp. 122-131.
[20] Charbathia S, Sharma S. A Comparative Study of Rivest Cipher Algorithms, International Journal of Information & Computation Technology, 2014, pp. 0974-2239.
[21] Ronald L.Rivest. The RC5 Encryption Algorithm, Proceedings of the 1994 Leuven Workshop on Fast Software Encryption, Springer Berlin Publishers, Vol 1008,1995, pp. 86-96.
[22] Rivest RL, Robshaw MJ, Sidney R, Yin YL. The RC6 TM block cipher, Advanced Encryption Standard (AES) Conference, 1998, pp. 16.
[23] Dobbertin H. Cryptanalysis of MD4, Workshop on Fast Software Encryption Springer, Berlin, Heidelberg, 1996, pp. 53-69.
[24] Rivest, Ronald. The MD5 message-digest algorithm, 1992.
[25] Gupta P, Kumar S. A comparative analysis of SHA and MD5 algorithm, Architecture, Vol 1, 2014, pp. 5.
[26] Dobbertin, Hans, Antoon Bosselaers, Bart Preneel. RIPEMD-160: A strengthened version of RIPEMD. International Workshop on Fast Software Encryption. Springer, Berlin, Heidelberg, 1996, pp. 71-82.
[27] Aumasson JP, Henzen L, Meier W, Phan RC. Sha-3 proposal blake. Submission to NIST: 92, 2008.
[28] Abhishek roy and Sunil karforma. A survey on digital signatures and its applications, Journal of Computer and Information Technology, Vol.3, 2012, No. 1&2, pp.45-69.
[29] Stallings W. Cryptography and Network Security, 4/E, Pearson Education India, 2006.