A study: cryptology techniques and methodologies

Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniq...

Full description

Bibliographic Details
Main Authors: Safitri, Cutifa, Shoukat Ali, Haroon, Ibrahim, Jamaludin
Format: Article
Language:English
Published: International Journal of Science and Research 2013
Subjects:
Online Access:http://irep.iium.edu.my/38392/
http://irep.iium.edu.my/38392/1/A_Study_Cryptology_Techniques_and_Methodologies.pdf
_version_ 1848781597282664448
author Safitri, Cutifa
Shoukat Ali, Haroon
Ibrahim, Jamaludin
author_facet Safitri, Cutifa
Shoukat Ali, Haroon
Ibrahim, Jamaludin
author_sort Safitri, Cutifa
building IIUM Repository
collection Online Access
description Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and ‘bullet proof’ they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is.
first_indexed 2025-11-14T15:52:05Z
format Article
id iium-38392
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T15:52:05Z
publishDate 2013
publisher International Journal of Science and Research
recordtype eprints
repository_type Digital Repository
spelling iium-383922014-09-24T08:50:21Z http://irep.iium.edu.my/38392/ A study: cryptology techniques and methodologies Safitri, Cutifa Shoukat Ali, Haroon Ibrahim, Jamaludin T Technology (General) Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniques and measures how strong and ‘bullet proof’ they are. In this paper, a basic encryption, byte to byte and complex encryption is shown as a study of cryptosystem classes that were used to overcome the need from various users. By understanding the current world phenomenon, it would be easier to answer the question of how secure cryptology actually is. International Journal of Science and Research 2013-12 Article PeerReviewed application/pdf en http://irep.iium.edu.my/38392/1/A_Study_Cryptology_Techniques_and_Methodologies.pdf Safitri, Cutifa and Shoukat Ali, Haroon and Ibrahim, Jamaludin (2013) A study: cryptology techniques and methodologies. International Journal of Science and Research (IJSR), 2 (12). pp. 352-357. ISSN 2319-7064 http://www.ijsr.net/archive/v2i12/MDIwMTM2NTM=.pdf
spellingShingle T Technology (General)
Safitri, Cutifa
Shoukat Ali, Haroon
Ibrahim, Jamaludin
A study: cryptology techniques and methodologies
title A study: cryptology techniques and methodologies
title_full A study: cryptology techniques and methodologies
title_fullStr A study: cryptology techniques and methodologies
title_full_unstemmed A study: cryptology techniques and methodologies
title_short A study: cryptology techniques and methodologies
title_sort study: cryptology techniques and methodologies
topic T Technology (General)
url http://irep.iium.edu.my/38392/
http://irep.iium.edu.my/38392/
http://irep.iium.edu.my/38392/1/A_Study_Cryptology_Techniques_and_Methodologies.pdf