CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Brief History of Encryption

by Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Number 9
Year of Publication: 2015
Authors: Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare
10.5120/ijca2015907390

Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare . Brief History of Encryption. International Journal of Computer Applications. 131, 9 ( December 2015), 28-31. DOI=10.5120/ijca2015907390

@article{ 10.5120/ijca2015907390,
author = { Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare },
title = { Brief History of Encryption },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 131 },
number = { 9 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 28-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume131/number9/23479-2015907390/ },
doi = { 10.5120/ijca2015907390 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:26:50.209739+05:30
%A Dwiti Pandya
%A Khushboo Ram Narayan
%A Sneha Thakkar
%A Tanvi Madhekar
%A B.S. Thakare
%T Brief History of Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 131
%N 9
%P 28-31
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Secure communication has been required since thousands of years. This led to the invention of cryptography. In ancient world, primitive methods were adopted for passing messages secretly. But with the invention of internet and world wide web, which is used for communicating via mail, messages, online shopping, online banking, etc., increased the need of information security. Thus a proper understanding of various methods of cryptography and its implementation can fulfill the requirements of securing valuable and sensitive information. This paper takes us through the various methods of cryptography adopted in the ancient period, medieval period and the modern era.

References
  1. “History of cryptography.” Wikipedia: The Free Encyclopedia. Wikimedia Foundation, Inc. 5th November 2015. Web. 10th November 2015. < https://en.wikipedia.org/wiki/History_of_cryptography>
  2. The Evolution of Cryptography. (n.d.). Retrieved November12,2015,fromhttp://www.sherpasoftware.com/blog/the-evolution-of-cryptography/
  3. Bellare, M., Rogaway, P., 2005. Introduction to modern cryptography.
  4. J. Daemen and V. Rijmen. The Design of Rijndael. Springer, 2001.
  5. M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput, Vol. 17, No. 2, April 1988.
Index Terms

Computer Science
Information Sciences

Keywords

AES DES MD4 RC4 SHA SIGABA