IIUM Repository

A study: cryptology techniques and methodologies

Safitri, Cutifa and Shoukat Ali, Haroon and Ibrahim, Jamaludin (2013) A study: cryptology techniques and methodologies. International Journal of Science and Research (IJSR), 2 (12). pp. 352-357. ISSN 2319-7064

[img] PDF - Published Version
Restricted to Repository staff only

Download (830kB) | Request a copy


Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and ‘bullet proof’ they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is.

Item Type: Article (Journal)
Additional Information: 6202/38392
Uncontrolled Keywords: Information Security, Cryptosystems, Network Security, Cryptoanalysis, Cryptography.
Subjects: T Technology > T Technology (General)
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology
Kulliyyah of Information and Communication Technology
Depositing User: Ahmad Nazreen Mohd Shamsuri (PT)
Date Deposited: 24 Sep 2014 16:50
Last Modified: 24 Sep 2014 16:50
URI: http://irep.iium.edu.my/id/eprint/38392

Actions (login required)

View Item View Item


Downloads per month over past year