IMPORTANCE OF PROPOSED INVESTIGATION: Cryptography is the science of writing in secret code. More generally, it is about analyzing and designing protocols that block foe; 1 various factors in information security such as data integrity, data confidentiality, authentication, and non-repudiation 2 8 are major concern of modern cryptography. This paper majorly focuses on cryptographic techniques and protocols used. We have categorized reported efforts into three major categories.
First, efforts related to detailed understanding of cryptography. Second, we are focused about the protocols associated with designing of cryptography algorithms. Lastly, we focused our study to understand and study the cryptographic algorithms designed so far.
Upon detailed summary and analysis, limitations certain algorithms as well as possible future research directions have been proposed. Fig .1 A Simple Cryptography ModelREVIEW OF LITERATURE AND RESEARCH GAP:Today’s cryptography is vastly more complex than its predecessor. Unlike the originaluse of cryptography in its classical roots where it was implemented to conceal both diplomatic and military secrets from the enemy, the cryptography of today, even though it still has far-reaching military implications, has expanded its domain, and has been designed to provide a cost-effective means of securing and thus protecting large amounts of electronic data that is stored and communicated across corporate networks worldwide.Cryptography offers the means for protecting this data all the while preserving the privacy of critical personal financial, medical, and ecommerce data that might end up in the hands of those who shouldn’t have access to it.
There have been many advances in the area of modern cryptography that have emerged beginning in the 1970s as the development of strong encryption-based protocols and newly developed cryptographic applications began to appear on the scene. On January, 1977, the National Bureau of Standards (NBS) adopted a data encryption standard called the Data Encryption Standard (DES), which was a milestone in launching cryptography research and development into the modern age of computing technology. Moreover, cryptography found its way into the commercial arena when, on December, 1980, the same algorithm, DES, was adopted by the American National Standards Institute (ANSI). Following this milestone was yet another when a new concept was proposed to develop Public Key Cryptography (PKC), which is still undergoing research development today (Levy, 2001).Objectives:The present study is purposed to achieve the following objectives: To present a detailed study of cryptography.
To study the protocols associated with cryptography. To study the factors associated with designing of cryptographic algorithm. To understand the types of cryptographic algorithm. To focus on certain algorithms under symmetric and asymmetric cryptography like DES 6, AES7, RSA10. To study the various type of key distribution 3 and key management system 4 5. Materials and Methods:Facilities:Infrastructure for the studyConveyance facilitiesLibrary facilitiesComputer facilitiesInternet facilitiesProposed plan of work: The work starts with the detailed study of topics in following flow:(a)Cryptography(b)Types of cryptography(c)Protocols 9 associated with cryptography(d)Key distribution (e)Techniques and algorithms used for cryptography