Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(490.91KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Survey Paper: Cryptography Is The Science Of Information Security
Mohammed AbuTaha, Mousa Farajallah, Radwan Tahboub, Mohammad Odeh
Pages - 298 - 309     |    Revised - 01-07-2011     |    Published - 05-08-2011
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 5   Issue - 3    |    Publication Date - July / August 2011  Table of Contents
MORE INFORMATION
References   |   Cited By (15)   |   Abstracting & Indexing
KEYWORDS
Symmetric encryption, a Symmetric encryption , hash algorithm
ABSTRACT
Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerce. Cryptography is used to ensure that the contents of a message are confidentiality transmitted and would not be altered. Confidentiality means nobody can understand the received message except the one who has the decipher key, and data cannot be changed means the original information would not be changed or modified; this is done when the sender includes a cryptographic operation called a hash function in the original message. A hash function is a mathematical representation of the information, when any information arrives at its receiver; the receiver calculates the value of this hash function. If the receiver’s hash function value is equivalent to the sender’s, the integrity of the message is assured .
CITED BY (15)  
1 Yadav, M. R., & Gill, N. S. (2015). Improvement in Performance of RSA Algorithm Using SLSB.
2 Bhanot, R., & Hans, R. (2015). A Review and Comparative Analysis of Various Encryption Algorithms. International Journal of Security & Its Applications, 9(4).
3 Kulkarni, s. international journal of pure and applied research in engineering and technology.
4 Farajallah, M. (2015). Chaos-based crypto and joint crypto-compression systems for images and videos (Doctoral dissertation, UNIVERSITE DE NANTES).
5 Ayokunle, T. B., Ogah, U. S., & Binitie, A. P. (2015). Encryption and Decryption of Messages Using Advanced Encryption Standard and System of Nonlinear Equations. International Journal of Pure and Applied Sciences and Technology, 27(1), 1.
6 Lee, J. D., Im, H. J., Kang, W. M., & Park, J. H. (2014). Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices. Mathematical Problems in Engineering, 2014.
7 Mobhani, A. B., & Mishra, S. K. (2014). Diffusion of Cipher Blocks at Bit Level in Parallel AES to Improve Bit–Ratio Test thus Increasing Cryptanalysis Complexity.
8 Sharma, R. S., Hiranwal, S., & Goyal, D. Analysis & Design Of Hybrid Cryptography Using Moving Image.
9 Kumar, C., Dutta, S., & Chakborty, S. (2014, March). Musical cryptography using genetic algorithm. In Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference on (pp. 1742-1747). IEEE.
10 Sharma, R. S., Hiranwal, S., & Goyal, D. Analysis & Design Of Hybrid Cryptography Using Moving Image.
11 Dutta, S., Kumar, C., & Chakraborty, S. (2013). A symmetric key algorithm for cryptography using music. International Journal of Engineering and Technology, 5(3), 3109-3115.
12 Shahi, G., & Singh, C. (2013). To Secure and Compress the Message on Local Area Network. International Journal of Computer Applications, 69(17), 43-47.
13 Rote, G. D., & Patil, A. M. Steganography with Cryptography Technique For Data Hiding.
14 Das, D., Lanjewar, U. A., & Sharma, S. J. The Art of Cryptology: From Ancient Number System to Strange Number System.
15 Zirra, P. B., Wajiga, G. M., & Boukari, S. (2012). Generating Ciphertext Using Systems of Equations: An Asymmetric Key Approach. Int. J. Pure Appl. Sci. Technol, 8(2), 47-53.
ABSTRACTING & INDEXING
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Libsearch 
5 Bielefeld Academic Search Engine (BASE) 
6 Scribd 
7 SlideShare 
8 PdfSR 
REFERENCES
A. Forouzan.,: " Cryptography and Network Security ", First Edition. McGraw-Hill, (2007), USA.
C .Shannon,. " Communication Theory of Secrecy Systems ". Bell Syst, (1949):, Tech. J., Vol (28), pp: 656-715.
D.Delfs., and K. Helmut.,: " Introduction To Cryptography: Principles and applications ", Second Edition. Springer Science & Business Media, (2007), Germany.
D.Salomon" Data Privacy and Security " First Edition. Springer-Verlag New York, ., (2003):, Inc. USA.
E.Ralph., F Weierud" Naval Enigma: M4 and Its Rotors ". Crypologia, ,. (1987):, Vol(11),pp:235-244.
G .Dieter: " Computer Security ", Second Edition. John Wiley & Sons, , (2005), UK.
H. Rodríguez, et al,: " Cryptographic Algorithms on Reconfigurable Hardware ", First Edition. Springer, (2006), USA.
H.Kenneth, " Elementary Number Theory and Its Applications " Third Edition. Addison-Wesley, (1992): Germany.
J Hoffstein., et al, " An Introduction to Mathematical Cryptography ", First Edition. Springer Science & Business Media, (2008):, Germany.
J. Badeau.,: " The Genius of Arab Civilization ", Second Edition. MIT Press,(1983), USA.
J.R Childs: " General Solution of the ADFGVX Cipher System ". Aegean Park Press, ,(2000), USA.
K .Thomas, : " The Myth Of The Skytale ". Taylor & Francis, (1998), Vol (33), pp: 244-260.
M .Chapple., M Solomon,: " Information Security Illuminated " First Edition. Jones and Bartlett Publishers, (2005), USA.
M.Lucas, " Thomas Jefferson wheel cipher ", Monticello Research Department, Thomas Jefferson Foundation, Charlottesville, (1995):, VA.
R Hamamreh., M Farajallah., " Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher ". International Journal of Computer Science and Network Security, (2009): Vol (9), pp: 12-21.
S .Maret," Cryptography Basics PKI ", First Edition. Dimension Data SA, ., (1999):, Switzerland.
W .Reinhard., " Cryptology Unlocked ", Translation Edition By Angelika Shafir. John Wiley & Sons, (2007):, UK.
W .Stallings, " Cryptography and network security, Principles and practices ", Fourth Edition. Pearson Prentice Hall, (2006):, USA.
MANUSCRIPT AUTHORS
Mr. Mohammed AbuTaha
ppu - Palestinian Occupied
m_abutaha@ppu.edu
Mr. Mousa Farajallah
- Palestinian Occupied Territori
Dr. Radwan Tahboub
- Palestinian Occupied Territori
Dr. Mohammad Odeh
- Palestinian Occupied Territori


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions