Open Access   Article Go Back

Secure and Authenticated Cryptographic Techniques: “A Review”

S. Srivastav1 , V. Pal2 , V. Gupta3 , K.K. Gola4

  1. Department of Mathematics, Faculty of Engineering, TMU, Moradabad, 244001 India.
  2. Department of Mathematics, Faculty of Engineering, TMU, Moradabad, 244001 India.
  3. Department of Mathematics, Faculty of Engineering, TMU, Moradabad, 244001 India.
  4. Department of Computer Science and Engineering, Faculty of Engineering, TMU, Moradabad, 244001 India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 861-870, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.861870

Online published on May 31, 2018

Copyright © S. Srivastav, V. Pal, V. Gupta, K.K. Gola . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Srivastav, V. Pal, V. Gupta, K.K. Gola, “Secure and Authenticated Cryptographic Techniques: “A Review”,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.861-870, 2018.

MLA Style Citation: S. Srivastav, V. Pal, V. Gupta, K.K. Gola "Secure and Authenticated Cryptographic Techniques: “A Review”." International Journal of Computer Sciences and Engineering 6.5 (2018): 861-870.

APA Style Citation: S. Srivastav, V. Pal, V. Gupta, K.K. Gola, (2018). Secure and Authenticated Cryptographic Techniques: “A Review”. International Journal of Computer Sciences and Engineering, 6(5), 861-870.

BibTex Style Citation:
@article{Srivastav_2018,
author = {S. Srivastav, V. Pal, V. Gupta, K.K. Gola},
title = {Secure and Authenticated Cryptographic Techniques: “A Review”},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {861-870},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2079},
doi = {https://doi.org/10.26438/ijcse/v6i5.861870}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.861870}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2079
TI - Secure and Authenticated Cryptographic Techniques: “A Review”
T2 - International Journal of Computer Sciences and Engineering
AU - S. Srivastav, V. Pal, V. Gupta, K.K. Gola
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 861-870
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
855 1121 downloads 156 downloads
  
  
           

Abstract

In the world of the high technology networking system, it is very important to ensure the security of the data. To make our data secure during communications, Cryptography is the best method in networking security to provide the confidentiality or authentication. There are two main methods which are used to achieve these two things (i.e. confidentiality and authentication) in cryptography that are public key cryptosystem and digital signatures. Here this work shows a survey on the existing techniques and also presents a comparison that helps the researches to find the gaps in the existing techniques.

Key-Words / Index Term

Encryption, Decryption, Symmetric key, Public Key, Cryptographic algorithms, Digital Signature

References

[1] Abdul D.S, Kader H.M Abdul, Hadhoud, M.M., “Performance Evaluation of Symmetric Encryption Algorithms”, Communications of the IBIMA, Volume 8, 2009, pp. 58-64.
[2] Apoorva, Kumar Yogesh, “Comparative Study of Different Symmetric Key Cryptography”, IJAIEM, Vol. 2, Issue 7, July 2013, pp.204-206.
[3] Babita and Gurjeet Kaur, "network security based on cryptography and steganography techniques", International Journal of advanced research in computer science. VOL 8, NO. 4, May 2017(special issue), pp. 161-165.
[4] B.Nithya and P.Sripriya" A review of cryptographic algorithms in network security". International journal of engineering and technology (IJET). Vol 8,no.1, FEB-MAR 2016. pp. 324-331.
[5] Cornwell Jason W, “Blowfish survey”, department of computer science, Columbus state university, Columbus, GA, 2010
[6] Darshana Patil and P.M.Chawan" A survey on enhanced cryptographic techniques for messages encryption and decryption". International journal of innovative research in computer and communication engineering. Vol 5, Issue 3,March 2017. pp. 3713-3719.
[7] Deepti Chaudhary and Rashmi Welekar, “secure authentication using visual cryptography”, International Journal of computer science and applications, vol 8, no. 1, JAN-MAR 2015, pp. 65-68.
[8] Dhawan Priya, “Performance Comparison: Security Design Choices”, Microsoft Developer Network October 2002.
[9] Harpreet Kaur, Vaishali Verma, Jaya Mishra." A survey paper on cryptography" International conference on innovative trends and technologies in engineering sciences and education. 8th & 9th September. www.conferenceworld.in. pp. 129-136.
[10] Kamal Kumar Gola, Zubair Iqbal, and Bhumika Gupta, "Modified RSA digital signature scheme for data confidentiality", IJCA (0975 – 8887) Volume 106 – No 13, November 2014
[11] M.Chanda Mona, S.Banu Chitra, V.Gayathri" A survey on various encryption and decryption algorithms". International journal of security and Singaporean journal of scientific research. VOL 6, NO. 6, 2014. pp. 289-300.
[12] Marwaha Mohit, Bedi Rajeev, Singh Amritpal, Singh Tejinder, “comparative analysis of cryptographic algorithms”, International Journal of advanced engineering technology/IV/III/ July Sep 2013/16-18.
[13] Monika Agrawal and Pradeep Mishra."A comparative survey on symmetric key encryption techniques". International journal on computer science and engineering (IJSCE).VOL.4, NO.5, May 2012. pp. 877-882.
[14] Muhammad Faheem Mushtaq, Sapiee Jamel,Abdul Kadir Hassan Disina, Zahraddeen A.Pindar,Nur Shafinaz Ahmad Shakir, Mustafa Mat Deris."A survey on the cryptography encryption Algorithms", International Journal of advanced computer science and applications, volume 8, number 11, 2017. pp. 333-344.
[15] Mukund R.Joshi and Renuka Avinash,”Network security with cryptography”. International journal of computer science and mobile computing(IJCSMC). VOL 4, Issue 1, January 2015, pp. 201-204.
[16] Nadeem Aamer, “Performance Comparison of Data Encryption Algorithms”, Oct 2008.
[17] Pallavi H.Dixit,Kamlesh B.Waskar, Uttam L.Bombale, “Multilevel network security combining cryptography and steganography on ARM platform", a journal of embedded systems, 2015, Vol 3, no. 1, pp. 11-15.
[18] Prerna Mahajan and Abhishek Sachdeva, "A Study of encryption algorithms AES, DES and RSA for security", Global Journal of CS and technology network, web and security. Vol 13, issue 15 version 1.0, year- 2013. pp. 15-22.
[19] Saini Bahar, “survey on performance analysis of various cryptographic algorithms”, International Journal of advanced research in computer science and software engineering, Volume 4, issue 4, April 2014, pp. 1-4.
[20] Sandeep Tayal, Nipin Gupta, Pankaj Gupta, Deepak Goyal, Monika Goyal.” A review paper on network security and cryptography”, advances of computational sciences and technology. Vol 10, no. 5, 2017, pp. 763-770.
[21] Saranya K, Mohanapriya K, Udhayan J."A review on symmetric key encryption techniques in cryptography". International journal of science, engineering, and technology research(IJSETR), VOLUME 3, issue 3, March 2014. pp.539-544.
[22] Sarita Kumari"A research paper on cryptography encryption and compression techniques". International journal of engineering and computer science. VOL 6,Issue 4,April 2017.pp. 20915-20919.
[23] Seth Shashi Mehrotra, Mishra Rajan, “Comparative analysis of Encryption algorithm for data communication”, International Journal of Computer Science and Technology, vol. 2, Issue 2, June 2011, pp. 292-294.
[24] Singh Gurjeevan, Kumar Ashwani, Sandha K.S. “A Study of New Trends in Blowfish Algorithm” International Journal of Engineering Research and Applications (IJERA), Vol. 1, Issue 2, pp.321-326
[25] Tamimi A. Al., “Performance Analysis of Data Encryption Algorithms”, Oct 2008.
[26] Thakur Jawahar, Kumar Nagesh. “DES, AES, and Blowfish Symmetric Key Cryptography algorithm3 Simulation-Based Performance Analysis”, IJETAE, Vol. 1, Issue 2, DEC. 2011, pp. 6-12.
[27] Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs, "Efficient public-key cryptography in the presence of key leakage”, computer science dept. august 17, 2017. pp. 1-33.