A study: cryptology techniques and methodologies

Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniq...

Full description

Bibliographic Details
Main Authors: Safitri, Cutifa, Shoukat Ali, Haroon, Ibrahim, Jamaludin
Format: Article
Language:English
Published: International Journal of Science and Research 2013
Subjects:
Online Access:http://irep.iium.edu.my/38392/
http://irep.iium.edu.my/38392/
http://irep.iium.edu.my/38392/1/A_Study_Cryptology_Techniques_and_Methodologies.pdf
id iium-38392
recordtype eprints
spelling iium-383922014-09-24T08:50:21Z http://irep.iium.edu.my/38392/ A study: cryptology techniques and methodologies Safitri, Cutifa Shoukat Ali, Haroon Ibrahim, Jamaludin T Technology (General) Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and ‘bullet proof’ they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is. International Journal of Science and Research 2013-12 Article PeerReviewed application/pdf en http://irep.iium.edu.my/38392/1/A_Study_Cryptology_Techniques_and_Methodologies.pdf Safitri, Cutifa and Shoukat Ali, Haroon and Ibrahim, Jamaludin (2013) A study: cryptology techniques and methodologies. International Journal of Science and Research (IJSR), 2 (12). pp. 352-357. ISSN 2319-7064 http://www.ijsr.net/archive/v2i12/MDIwMTM2NTM=.pdf
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic T Technology (General)
spellingShingle T Technology (General)
Safitri, Cutifa
Shoukat Ali, Haroon
Ibrahim, Jamaludin
A study: cryptology techniques and methodologies
description Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and ‘bullet proof’ they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is.
format Article
author Safitri, Cutifa
Shoukat Ali, Haroon
Ibrahim, Jamaludin
author_facet Safitri, Cutifa
Shoukat Ali, Haroon
Ibrahim, Jamaludin
author_sort Safitri, Cutifa
title A study: cryptology techniques and methodologies
title_short A study: cryptology techniques and methodologies
title_full A study: cryptology techniques and methodologies
title_fullStr A study: cryptology techniques and methodologies
title_full_unstemmed A study: cryptology techniques and methodologies
title_sort study: cryptology techniques and methodologies
publisher International Journal of Science and Research
publishDate 2013
url http://irep.iium.edu.my/38392/
http://irep.iium.edu.my/38392/
http://irep.iium.edu.my/38392/1/A_Study_Cryptology_Techniques_and_Methodologies.pdf
first_indexed 2023-09-18T20:55:09Z
last_indexed 2023-09-18T20:55:09Z
_version_ 1777410254670135296