A Comparative Survey on Cryptology-Based Methodologies
نویسندگان
چکیده
Security is an important issue related to the storage and communication of data and information. In data and information security, cryptography and steganography are two of the most common security techniques. On one hand, there is cryptography, which is the secret communication between two parties by message scrambling on the sender’s side and message unscrambling on the receiver’s side so that only the intended receiver gets the secret message. Cryptography and cryptanalysis constitute cryptology (or crypto) while steganography and steganalysis make up steganology (or stegano). This paper presents a comparative survey of various cryptology and steganology techniques by analyzing and comparing different methodologies using a set of predefined parameters. It also offers to the reader valuable knowledge on the state of the art techniques used on cryptanalysis. DOI: 10.4018/jisp.2012070101 2 International Journal of Information Security and Privacy, 6(3), 1-37, July-September 2012 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Basic Cryptology Concepts Cryptography is the process where an individual or party sends a message to another individual or party in a scrambled unintelligible manner such that only the intended party will get the scrambled message, which will be unscrambled to get the original message. The reverse engineering of cryptography is known as cryptanalysis. Cryptography and cryptanalysis together constitute cryptology. A cryptography system is known as a cryptosystem, or a cipher. Any cryptosystem must have a sender, plaintext, an enciphering (encrypting) function, an enciphering (encrypting) key, an algorithm, ciphertext, a transmission medium, a decrypting (deciphering) function, a decrypting (deciphering) key and a receiver (Figure 1). Plaintext is the original intelligible message a sender sends to the receiver. In order to scramble the plaintext to make it unintelligible to the potential attacker, an algorithm, along with a key, maps the plaintext to the unintelligible message known as ciphertext. This plaintext to ciphertext scrambling is known as enciphering. An algorithm is a mathematical function that maps one message to another message. A key is a variable that gives a unique output map when used with an algorithm. In enciphering, the function is referred to as an enciphering function and the key is referred to as an enciphering key. After encryption, the ciphertext is sent through a transmission medium to the receiver. When a receiver receives the ciphertext, he reverses the encryption to get the original plaintext. This reversing is referred to as deciphering. A deciphering function and a deciphering key are synonymous to their corresponding counterparts in encryption.
منابع مشابه
Comparative Analysis & Evaluation of Agent Oriented Methodologies Using Enhanced Feature Analysis Framework
The objective of this chapter is to provide an insight preview into various agent oriented methodologies by using an enhanced comparison framework based on criteria like process related criteria, steps and techniques related criteria, steps and usability criteria, model related or “concepts” related criteria, comparison regarding model related criteria and comparison regarding supportive relate...
متن کاملA Meta-Analysis of Survey-Based Research in MIS Field from 1992-2006
Survey research is among the most common methodologies employed in MIS research. However there is an increasing concern over the rigor of research method in MIS field. Based on a review and comparative analysis of the literature this paper provides a critical analysis of trends in the conduct of survey research in the MIS field. Some 651 survey-based studies reported in three leading MIS journa...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملAn Investigation of the Relationship between L2 Learning Styles and Teaching Methodologies in EFL Classes
Individual differences have always been a key element in the success and failure of learners in language classrooms. Learners come to EFL classes with various learning styles and teachers utilize different methodologies targeting different needs of the learners which may have important effects on the quality of the learning environment. In this study a comparison is made between learning styles...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJISP
دوره 6 شماره
صفحات -
تاریخ انتشار 2012