z-logo
open-access-imgOpen Access
CRYPTOGRAPHIC TECHNIQUE FOR COMMUNICATION SYSTEM
Author(s) -
Mohd Nabeel
Publication year - 2022
Publication title -
indian scientific journal of research in engineering and management
Language(s) - English
Resource type - Journals
ISSN - 2582-3930
DOI - 10.55041/ijsrem11460
Subject(s) - cryptography , computer science , financial cryptography , computer security , id based cryptography , key (lock) , the internet , public key cryptography , cipher , shared secret , communication source , strong cryptography , key exchange , neural cryptography , key distribution , encryption , computer network , world wide web
In Today’s world Sensitive data is increasingly used in communication over the internet. Thus Security of data is the biggest concern of internet users. Best solution is use of some cryptography algorithm which encrypts data in some cipher and transfers it over the internet and again decrypted to original data. The field of cryptography deals with the procedure for conveying information securely. Cryptography includes a set of techniques for scrambling or disguising data so that it is available only to someone who can restore the data to its original form. Cryptography or communication by using secret code was used by the Egyptians some 4000 years ago. However, the science of cryptography was initiated by Arabs since 600s. Cryptography becomes vital in the twentieth century where it played a crucial role in the World War I and 2. This paper focuses on the analysis of the two types of key cryptography exists, based on the availability of the key publicly: Private key Cryptography, and Public Key Cryptography. Both the sender and the recipient share a key that must be kept private.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here