Topics: Cryptography, Public-key cryptography, Digital signature Pages: 8 (2044 words) Published: May 17, 2013
International Journal of Science and Technology Volume 1 No. 3, March, 2012

A Survey on the Applications of Cryptography
Shivangi Goyal
University School Of Information Technology Guru Gobind Singh Indraprastha University 16-C, Dwarka, Delhi

This paper gives a brief summary of cryptography, where it is applied and its usage in various forms. Cryptography is a way of safeguarding the crucial data from unauthorized access. It has emerged as a secure means for transmission of information. It mainly helps in curbing intrusion from third party. It provides data confidentiality, integrity, electronic signatures, and advanced user authentication. The methods of cryptography use mathematics for securing the data (encryption and decryption). Keywords: Cryptography, Data Confidentiality, Integrity, Electronic signatures, Authentication, Encryption, Decryption

Information security plays a pivotal role during internet communication in today’s era of technology. It is tremendously important for people committing etransactions. For naïve people it may seem to be not that necessary orincreased security may provide comfort to paranoid people but the truth is that it is absolutely essential when communication is carried between tens of millions of people daily. There are various cryptography methods that provide a means for secure commerce and payment to private communications and protecting passwords. Cryptography is necessary for secure communications; it is not by itself sufficient. The reader of this paper will find variants of cryptography and their applications. This paper has two major purposes. The first is to provide some real examples of cryptography in use today. The second is to provide tabular summarization and conclusion. Curious readers should check out some of the web pages and pdf in the bibliography below for further detailed — and interesting! — background information.

There are different types of cryptography. There is a sender, receiver, intruder of information and cryptographic tool that prevents intruder from trespass the sensitive information.

2.1 Types of Cryptography 2.1.1 Public Key Cryptography

It involves two pairs of keys: one for encryption and another for decryption. Key used for encryption is a public key and distributed. On the other hand key used for decryption is private key.


Key Escrow Cryptography

Cryptography is the practice and study of techniques for secure communication in the presence of adversaries’. Typically, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering.

This technology allows the use of strong encryption, but also allowsobtaining decryption keys held by escrow agents (third party-entrusted key escrow). The decryption keys are split into parts and given to separate escrow authorities. Access to one part of the key does not help decrypt the data; both keys must be obtained.


Translucent Cryptography

In this scheme the government can decrypt some of the messages, but not all. Only p fraction of message can be decrypted and 1-p cannot be decrypted. This is advantageous over key escrow or no key escrow cryptography as entire information is not at security risk.

IJST © 2012 – IJST Publications UK. All rights reserved.


International Journal of Science and Technology (IJST) – Volume 1 No. 3, March, 2012


Symmetric Key Cryptography

Technique uses same key for encoding and decoding information. The sender and recipient of data must share same key and keep information secret preventing data access from outside.

but not perfect privacy, translucent cryptography provides some communications privacy, but not perfect privacy. In this scheme the degree of...

References: [1] [2] [3]
IJST © 2012 – IJST Publications UK. All rights reserved.
International Journal of Science and Technology (IJST) – Volume 1 No. 3, March, 2012 [4] [5] ication [6] [7] _signatures_vs._ink_on_paper_signatures [8] [9] 7/1/Zhao_Yi_200911_PhD_Thesis.pdf [10] s/wisa09p363.pdf [11] graphy+Include+Credit+Cards [12] [13] px
[14] c-Key_Cryptography [15] [16] [17] [18] n [19] [20] b92coding.html [21] 04/0419optical2.html [22] s/wisa09p363.pdf
IJST © 2012 – IJST Publications UK. All rights reserved.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • 2.1.2 Cryptography Facts Essay
  • Report on Cryptography Essay
  • Essay on Cryptography and Matrices
  • CSEC 630 Lab Assignment 1 Introduction To Cryptography Essay
  • Essay on The Importance Of Cryptography And The Legislative Issues That Surround Government Access
  • network cryptography Essay
  • Public-key Cryptography and E-commerce Essay

Become a StudyMode Member

Sign Up - It's Free