ACADEMICIA: An International Multidisciplinary Research Journal

  • Year: 2021
  • Volume: 11
  • Issue: 11

A review on different types of cryptography techniques

1Teerthanker Mahaveer Institute of Management and Technology, Teerthanker Mahaveer University, Moradabad, Uttar Pradesh, India, Email id: vipin555@rediffmail.com

Abstract

Today, data communication is mostly based on digital data transmission, with data security as a top priority in order for data to reach the intended user. Cryptography is a technique of using codes to secure information and communications so that only those who are supposed to read and process it may do so. The prefix “crypt-” stands for “secret” or “vault,” while the suffix “-graphy” signifies “writing.” Cryptography and cryptology, as well as cryptanalysis, are closely linked sciences. Techniques such as microdots, combining words with pictures, and other methods of concealing information in storage or transit are included. However, in today's computer-centric world, cryptography is most often linked with scrambling plaintext (regular text, also known as cleartext) into ciphertext (a process known as encryption), then back again (known as decryption). Cryptographers are professionals who work in this area. As a result, various cryptography methods, such as symmetric and asymmetric algorithms, are used to provide data security. RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), and ECC (Elliptic curve cryptography) are among the asymmetric encryption methods examined in this review article.

Keywords

Cryptography, Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography), RSA (Rivest Shamir and Adleman)