IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 2    
Website: http://www.ijser.org
scirp IJSER >> Volume 1, Issue 2, November 2010
Full Text(PDF, 3000)  PP.  
Aayushi Jangid
In today's world when hacking and computer data robbery and theft are common phenomena, it is very important to protect data and information that is sent over a particular network. And that is where the need for cryptography arises. Cryptography is the science of writing the data or information in a secret code. It involves encryption and decryption. The data that can be understood without any special efforts is called as the plaintext. This data can be converted into the secret code and this process is called as the encryption. This encrypted data is called as the cipher text. This encrypted text can be converted back into the plaintext by a key and this process is called as the decryption. Thus, cryptography consists of both, the encryption and the decryption process.
[1]. Barr, T.H. (2002). Invitation to Cryptology. Upper Saddle River, NJ: Prentice Hall.

[2]. Denning, D.E. (1982). Cryptography and Data Security. Reading, MA: Addison-Wesley.

[3]. Federal Information Processing Standards (FIPS) 140-2. (2001, May 25). Security Requirements for Cryptographic Modules. Gaithersburg, MD: National Institute of Standards and Technology (NIST). Retrieved from http://csrc.nist.gov/publications/fips/fips140- 2/fips1402.pdf

[4]. Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications. New York: John Wiley & Sons.

[5]. Schneier, B. (1996). Applied Cryptography, 2nd Ed. New York: John Wiley & Sons.

[6]. Cryptography Research Inc.'s cryptography.com Site

[7]. Crypto Log: The Internet Guide to Cryptography

[8]. RSA's Cryptography FAQ

[9]. Wikipedia pages on cryptography

Untitled Page