Learning the Basics of Cryptography with Practical Examples

  1. Shab E Noor 1
  2. Ali Ahmad 1
  3. Vanessa Martos Núñez 1
  4. Miguel J. Hornos Barranco 1
  1. 1 Universidad de Granada
    info

    Universidad de Granada

    Granada, España

    ROR https://ror.org/04njjy449

Zeitschrift:
ReiDoCrea: Revista electrónica de investigación y docencia creativa

ISSN: 2254-5883

Datum der Publikation: 2022

Ausgabe: 11

Seiten: 274-281

Art: Artikel

DOI: 10.30827/DIGIBUG.74740 DIALNET GOOGLE SCHOLAR lock_openOpen Access editor

Andere Publikationen in: ReiDoCrea: Revista electrónica de investigación y docencia creativa

Zusammenfassung

Cryptography is a secure technique of data communication and exchange that relies on encryption and decryption protocols. This technique is in use since many centuries. Nonetheless, in today’s world, it supports data protection and privacy while ensuring the authenticity and confidentiality of the data. Ecommerce, banking, military, and corporations are the prominent operators of this technology, although it is, directly or indirectly, linked to almost every single person nowadays. Symmetric and asymmetric key cryptography are the two fundamental forms of cryptography. Asymmetric key cryptography is more secure than symmetric but at the cost of greater computational complexity. The use of hash functions and digital signatures also contribute to the security of systems and the privacy of information. This article presents the basic differences between the fundamental types of cryptography as well as practical examples of encrypting information using various cipher systems, which will help to understand them. This is an introductory article that is primarily aimed at undergraduate students in the area of computer science, in order to enrich their understanding of the field.

Bibliographische Referenzen

  • Arroyo JCT, Dumdumaya CE, Delima AJP. Polybius Square in Cryptography: A Brief Review of Literature. International Journal. 2020;9(3).
  • Arslanian H, Fischer F. The Basics of Cryptography and Encryption. The Future of Finance: Springer; 2019. p. 89-93.
  • Bhatt AP, Sharma A. Quantum cryptography for internet of things security. Journal of Electronic Science and Technology. 2019;17(3):213-20.
  • Burniske C, Tatar J. Cryptoassets: The innovative investor's guide to bitcoin and beyond: McGraw-Hill Education New York; 2018.
  • Chandra S, Paira S, Alam SS, Sanyal G, editors. A comparative survey of symmetric and asymmetric key cryptography. 2014 international conference on electronics, communication and computational engineering (ICECCE); 2014: IEEE.
  • Delfs H, Knebl H, Knebl H. Introduction to cryptography: Springer; 2002.
  • Delfs H, Knebl H. Introduction to Cryptography Principles and Applications (2007). Springer.
  • Gaines HF. Cryptanalysis: A study of ciphers and their solution: Courier Corporation; 2014.
  • Gisin N, Ribordy G, Tittel W, Zbinden H. Quantum cryptography. Reviews of modern physics. 2002;74(1):145.
  • Katz J, Lindell Y. Introduction to modern cryptography: CRC press; 2020.
  • Maqsood F, Ahmed M, Mumtaz M, Ali M. Cryptography: a comparative analysis for modern techniques. International Journal of Advanced Computer Science and Applications. 2017;8(6):442-8.
  • Martin K. Cryptography: The key to digital security, how it works, and why it matters: WW Norton & Company; 2020.
  • McKenzie BJ, Harries R, Bell T. Selecting a hashing algorithm. Software: Practice and Experience. 1990;20(2):209-24.
  • Rajanbabu DT, Raj C, editors. Implementing a reliable cryptography based security tool for communication networks. 2014 International Conference on Science Engineering and Management Research (ICSEMR); 2014: IEEE.