A Review on Classical and Modern Encryption Techniques
Citation
Ali Mir Arif Mir Asif , Shaikh Abdul Hannan. "A Review on Classical and Modern Encryption Techniques", International Journal of Engineering Trends and Technology (IJETT), V12(4),199-203 June 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Often the objectives of information security cannot solely be achieved through mathematical algorithms and protocols alone, but require procedural techniques and abidance of laws to achieve the desired result. For example, privacy of letters is provided by sealed envelopes delivered by an accepted mail service. The physical security of the envelope is, for practical necessity, limited and so laws are enacted which make it a criminal offense to open mail for which one is not authorized. It is sometimes the case that security is achieved not through the information itself but through the physical document recording it. For example, paper currency requires special inks and material to prevent counterfeiting. Achieving information security in an electronic society requires a vast array of technical and legal skills. There is, however, no guarantee that all of the information security objectives deemed necessary can be adequately met. The technical means is provided through cryptography [1]. In this paper study of various classical and modern encryption techniques has carried out. Also a review of research and development of encryption techniques has done. Finally we compared the results and concluded that which technique is superior.
References
[1] Menezes AJ, Oorschot PCV, Vanstone SA, “Handbook of Applied Cryptography”, Boca Raton, Florida, USA:CRC Press, 1997.
[2] Fauzan Saeed and Mustafa Rashid, “Integrating Classical Encryption with Modern Technique”, IJCSNS, Vol. 10, no.5, May 2010.
[3] M. S. Hwang and C. Y. Liu, “Authenticated encryption schemes: current status and key issues", International Journal of Network Security, Vol. 1, no. 2, pp. 61-73, 2005.
[4] M. H. Ibrahim, “A method for obtaining deniable public key encryption", International Journal of Network Security, Vol. 8, no. 1, pp. 1-9, 2009.
[5] M. H. Ibrahim, “Receiver-deniable public-key encryption", International Journal of Network Security, Vol. 8, no. 2, pp. 159-165, 2009.
[6] William Stallings, “Cryptography and Network Security: Principles & Practices”, second edition, chapter 2 pg 29.
[7] http://www.cs.trincoll.edu/~crypto/historical/caesar.html
[8] V. Umakanta Sastry, N. Ravi Shanker and S. Durga Bhavani, “A Modified Playfair Cipher Involving Interweaving and Iteration”, International Journal of Computer Theory and Engineering”, Vol. 1, no. 5, December, 2009.
[9] Y. C. Hu, A. Perrig, and D. B. Johnson, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks”, Proceeding of IEEE Workshop on Mobile Computing Systems and Applications, 2003.
[10] V. Umakanta Sastry1, N. Ravi Shankar2, and S. Durga Bhavan, “A Modified Hill Cipher Involving Interweaving and Iteration”, International Journal of Network Security, Vol. 11, No. 1, PP. 11-16, July 2010.
[11] Results of Comparing Tens of Encryption Algorithms Using Di®erent Settings- Crypto++ Benchmark, Retrieved Oct. 1, 2008. (http://www.eskimo.com/wei-Dai/benchmarks.html).
[12] Sriram Ramanujam and Marimuthu Karuppiah, “Designing an algorithm with high Avalanche Effect”, IJCSNS, VOL. 11 No. 1, January 2011.
[13] Janan Ateya Mahdi, “Design and Implementation of Proposed B-R Encryption Algorithm”, IJCCCSE, Vol. 209, No. 1, 2009.
[14] Fauzan Saeed, Abdul Basit Abdul Qadir, Yar M. Mughal, Mustafa Rashid, “A Novel Key Generation for FMET”, International Journal of Computer Science and Network Security, Vol. 11, no. 6, pp. 197-202, 2011.
Keywords
Cipher, Encryption, Plain Text, Avalanche Effects Decryption, Cipher Text.