Research Article

Brief History of Encryption

by  Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Issue 9
Published: December 2015
Authors: Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare
10.5120/ijca2015907390
PDF

Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare . Brief History of Encryption. International Journal of Computer Applications. 131, 9 (December 2015), 28-31. DOI=10.5120/ijca2015907390

                        @article{ 10.5120/ijca2015907390,
                        author  = { Dwiti Pandya,Khushboo Ram Narayan,Sneha Thakkar,Tanvi Madhekar,B.S. Thakare },
                        title   = { Brief History of Encryption },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 131 },
                        number  = { 9 },
                        pages   = { 28-31 },
                        doi     = { 10.5120/ijca2015907390 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A Dwiti Pandya
                        %A Khushboo Ram Narayan
                        %A Sneha Thakkar
                        %A Tanvi Madhekar
                        %A B.S. Thakare
                        %T Brief History of Encryption%T 
                        %J International Journal of Computer Applications
                        %V 131
                        %N 9
                        %P 28-31
                        %R 10.5120/ijca2015907390
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Secure communication has been required since thousands of years. This led to the invention of cryptography. In ancient world, primitive methods were adopted for passing messages secretly. But with the invention of internet and world wide web, which is used for communicating via mail, messages, online shopping, online banking, etc., increased the need of information security. Thus a proper understanding of various methods of cryptography and its implementation can fulfill the requirements of securing valuable and sensitive information. This paper takes us through the various methods of cryptography adopted in the ancient period, medieval period and the modern era.

References
  • “History of cryptography.” Wikipedia: The Free Encyclopedia. Wikimedia Foundation, Inc. 5th November 2015. Web. 10th November 2015. < https://en.wikipedia.org/wiki/History_of_cryptography>
  • The Evolution of Cryptography. (n.d.). Retrieved November12,2015,fromhttp://www.sherpasoftware.com/blog/the-evolution-of-cryptography/
  • Bellare, M., Rogaway, P., 2005. Introduction to modern cryptography.
  • J. Daemen and V. Rijmen. The Design of Rijndael. Springer, 2001.
  • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput, Vol. 17, No. 2, April 1988.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

AES DES MD4 RC4 SHA SIGABA

Powered by PhDFocusTM