A Survey on Different Cryptographic Techniques

Authors

  • Mathew LR Dept. of CSE, St. Thomas College of Engineering and Technology, Kozhuvalloor, India

Keywords:

Encryption, Cryptography, Symmetric, Asymmetric

Abstract

Data transmission over the Internet for various purposes has become a necessary part of technology nowadays. But, the data sent over the Internet or the data to be retrieved can be hacked by any other party in several ways. To provide security, various cryptographic schemes have been developed. Among the different schemes the data integrity cannot be ensured in a number of aspects. Cryptography ensures that the message should be sent without any alternation and only the authorized person can be able to open and read the message. Cryptographic techniques can be broadly classified into two methods, namely symmetric and asymmetric. This paper focus mainly on the different kinds of the existing encryption techniques, and a comparative study of different algorithms.

References

Stallings W., “Cryptography and Network Security”, 2nd Edition, Prentice Hall, 1999.

Sharma A., Thakur R S and Jaloree S., "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4(5), pp. 5-11, Oct 2016

Dipti K. S., Neha B., “Proposed System for Data Hiding Using Cryptography and Steganography”, International Journal of Computer Appilcations, Vol.8(9), pp.7-10, Oct 2010.

Schneier B., “Description of a New Variable Length Key, 64 Bit Block Cipher (Blowfish)” International Workshop on Fast Software Encryption, Cambridge Security Workshop proceedings, pp.191-204, Dec 1993. ISBN 978-3-540-48456-1

Minaam D. S. A., Abdual-Kader H. M., Hadhoud M.M, “Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types”, International Journal of Network Security, Vol.11(2), pp.78-87, Sep 2010.

Nigam A, Singh V., "Securing Data Transmission in Cloud using Encryption Algorithms", International Journal of Computer Sciences and Engineering, Vol.4(6), pp.21-25, Jun -2016

Rin M. C. J., Lin Y. L., “A VLSI implementation of the Blowfish Encryption/Decryption Algorithm”, ASP-DAC '00 Proceedings of the 2000 Asia and South Pacific Design Automation Conference, Jan 2000. ISBN:0-7803-5974-7

Mathew M, Sumathi D., Ranjima P, Sivaprakash P., "Secure Cloud Data Sharing Using Key-Aggregate Cryptosystem", International Journal of Computer Sciences and Engineering, Vol.2(8), pp. 121-123, Aug -2014

Agarwal M., Mishra P., “A comparitive survey on Symmetric Key Encryption Techniques” International Journal on Computer Sciences and Engineering, Vol.4(5), pp.877-882, May 2012.

Downloads

Published

2025-11-11

How to Cite

[1]
L. Mathew, “A Survey on Different Cryptographic Techniques”, Int. J. Comp. Sci. Eng., vol. 5, no. 2, pp. 27–30, Nov. 2025.