Full Paper View

 

Cryptography: Security and Integrity of Data Management

Faisal Abbasi, Pawan Singh
Research Paper | Journal Paper
Volume 1 , Issue 2 , PP 1-9

Abstract

Internet always deals with data. Basically, data is any type of digital information that has been stored in the servers. With the advancement of technology, billion tons of da-ta have been accumulated over the internet. Protection of these data is very crucial as; theft of these data will lead to damages beyond imagination. Data Security is the protection of these data and privacy, which prevents a hacker from unauthorized access to computers, applications, and data servers. Data security is achieved by implementing Cryptography. Cryptography is a technique in which data is encrypted and stored in the databases so that if by chance anyone gets access to these data, it will of no use to them. There are many cryptography algorithms that are widely used to encrypt and decrypt data, some of them are the AES algorithm, stream ciphers, DES algorithms, etc. The concept of cryptography is not only limited to text encryption but also has a wide application in visual cryptography, watermarking, steganography, etc. Now a day’s security of communication has become very important, especially after people have started using internet banking. Everything on the world wide web is all about confidentiality, integrity, and authentication.

Key-Words / Index Term

Data Encryption and Decryption, Compression, Cryptography Concepts, Security, and Integrity

References

  1. Abbasi and P. Singh (2021) Quantum Cryptography: The Future of Internet and Security Analysis. Journal of Management and Service Science,1(1), 4, pp. 1-12.
  2. Ekert, “Quantum Cryptography Based on Bell’s Theorem,” Phys. Rev. Lett. 67, 661 (5 August 1991).
  3. Ekert, Artur. "What is Quantum Cryptography?" Centre for Quantum Computation –Oxford University. Conger., S., and Loch, K.D. (eds.). Ethics and computer use. Commun. ACM 38, 12 (entire issue).
  4. Johnson, R. Colin. "MagiQ employs quantum technology for secure encryption." EE Times. 6 Nov. 2002.
  5. Mullins, Justin. "Quantum Cryptography's Reach Extended." IEEE Spectrum Online. 1 Aug. 2003.
  6. Jirwan, A. Singh and S. Vijay, "Review and Analysis of Cryptography Techniques," International Journal of Scientific & Engineering Research, vol. 3, no. 4, pp. 1-6, 2013.
  7. Tayal, N. Gupta, P. Gupta, D. Goyal and M. Goyal, "A Review paper on Network Security and Cryptography," Advances in Computational Sciences and Technology.
  8. Callas, "The Future of Cryptography," Information Systems Security, vol. 16, no. 1, pp. 15-22, 2007.
  9. L. Massey, "Cryptography—A selective survey," Digital Communications, vol. 85, pp. 3-25, 1986.
  10. Schneier, "The Non-Security of Secrecy," Communications of the ACM, vol. 47, no. 10, pp. 120-120, 2004.
  11. Varol, F. Aydo?an and A. Varol, "Cyber Attacks Targetting N. Varol, F. Aydo?an and A. Varol, "Cyber Attacks Targetting Android Cellphones," in the 5th International Symposium Tirgu Mures, 2017
  12. Yadav, P. Singh (2020) Web Application and Penetration Testing. Journal of Informatics Electrical and Electronics Engineering, 1(2), 3, 1-11.
  13. K. Tomar and P. Singh (2021) Cyber Security Methodologies and Attacks. Journal of Management and Service Science, 1(1), 2, pp. 1-8.