Main Article Content

Chakshu Diwan
Sunil K Singh


In this rapidly changing world where the need of digital storage is multiplying, where advance requirement is securing the data, so that the data should reach to the designated user. Cryptography plays the crucial role on ensuring the information security and authenticity of modernized computer systems. Information Security is a challenging issue of data communication today that is handling different areas including secure communication channel, robust data encryption technique to maintain the database. The confidential data could be accessed by the unauthorized user for ill-natured objective. So, it is mandatory to apply effective encryption and decryption methods to reinforce data security. In this review paper, various cryptographic techniques, like Rivest-Shamir-Adleman (RSA), Diffie-Hellman Key Exchange, Elliptic curve cryptography (ECC), Quantum Key Distribution (QKD) and Hybrid Cryptography are observed. By enhancing abstract, we address the problem of determining and concluding security and also the future of encryption in a context where the database of the user must be protected.


Download data is not yet available.

Article Details



. SuyashVerma, RajnishChoubey, Roopalisoni “An Efficient Developed New Symmetric Key Cryptography Algorithm for Information Security†International Journal of Emerging Technology and Advanced Engineering Volume 2, Issue 7, July 2012.

. S. Castano, M. Fugini, G. Martella, and P. Samarati, Database Security, Addison-Wesley, 1995.

. Dr. L. Arockiam, S. Monikandan, “AROcrypt: A Confidentiality Technique for Securing Enterprise’s Data in Cloudâ€, International Journal of Engineering and Technology, ISSN: 0975-4024, Volume 7, Issue 1, February-March 2015, pp. 245-253.

. Wuling Ren, "A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communicationâ€, Second International Conference on Modeling", Simulation and Visualization Methods (WMSVM), 2010.

. Grabbe J, Data Encryption Standard: The Triple DES algorithm illustrated Laissez faire city time, Volume: 2, No. 28, and 2003.

. Chih-Pin Su, Tsung-Fu Lin, Chih-Tsun Huang, and Cheng-Wen Wu, National Tsing Hua University,†A high throughput low cost AES processor†IEEE Communications Magazine 0163-6804/03 2003 IEEE.

. Nithin Nagaraj, “Short communication One-Time Pad as a nonlinear dynamical system†Amrita Vishwa Vidyapeetham, Amritapuri Campus, India, Elsevier

. Aman Kumar, Dr. Sudesh Jakhar and Mr. Sunil Makkar, "Comparative Analysis between DES and RSA Algorithm’s", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, pp. 386-391, July 2012.

. Xin Zhou and Xiaofei Tang, "Research and Implementation of RSA Algorithm for Encryption and Decryption", the 6th International Forum on Strategic Technology, pp. 1118 – 1121, 2011.

. Simon Blake Wilson et al., “Key agreement protocols and their security analysis,†9-sep- 1997.

. Erfaneh Noorouzil et al, “A New Digital Signature Algorithmâ€, International Conference on Machine Learning and Computing, IPCSIT vol.3, 2011.

. Robert Zuccherato, “Elliptic Curve Cryptography Support in Entrust,†Entrust ltd. in Canada, Dated: 9-may-2000.

. Othman O. Khalifa, “Communication Cryptographyâ€, IEEE transaction on Cryptography, 2004, pp. 1-15.

. Meenakshi Shankar and Akshaya.P, International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014. Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts