Cryptography: A Useful and Widely Used Tool in Today’s Engineering Security

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2014 by IJETT Journal
Volume-12 Number-4
Year of Publication : 2014
Authors : Ekwe A.O , Okonba B.J


Ekwe A.O , Okonba B.J. "Cryptography: A Useful and Widely Used Tool in Today’s Engineering Security", International Journal of Engineering Trends and Technology (IJETT), V12(4),196-198 June 2014. ISSN:2231-5381. published by seventh sense research group


Encryption is a useful and widely used tool in security engineering today. It involved the use of codes and a cipher to transform information into unintelligible data. This paper presents a systematic approach for data encryption. Ad-hoc networks that communicate between the nodes of the network using basic server client methodology were created first. These algorithms were found very effective and maintain security and also reduce the overhead. And, through the data encryption and decryption, the protection of data confidentiality, availability, authentication, authorization and integrity were achieved.


[1] Kaufman, C., Perlman, R., and Speciner, M., Network Security: Private Communication in a public world, Prentice-Hall, Eaglewood Cliffs, NJ, 1995
[2] A. Boukerche, “Handbook of Algorithms for Wireless and Mobile Networks and Computing”, CRC Chapman Hall, 2005
[3] A. Boukerche, “Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks”, Wiley & Sons, 2008.
[4] McDaniel, P. (2006, December 6). Physical and digital convergence: Where the Internet is the enemy. Eighth International Conference on Information and Communications Security. Retrieved April 24, 2009, at McDaniel.html
[5] Yonglin Ren, Azzedine Boukerche and Lynda Mokdad, “Performance Analysis of a Selective Encryption Algorithm for Wireless Ad hoc Network” proceedings of IEEE WCNC, pp. 7-11, 2011
[6] A. J. Prakash, and V. R. Uthariaraj, “Multicrypt: A Provably Secur Encryption Scheme for Multicast Communication”, Proceedings of 1st Int’l Conference on Networks and Communications, pp. 246–253, 2009.


Encryption; Availability; Confidentiality; Authorization.