2015
DOI: 10.5120/ijca2015907390
|View full text |Cite
|
Sign up to set email alerts
|

Brief History of Encryption

Abstract: Secure communication has been required since thousands of years. This led to the invention of cryptography. In ancient world, primitive methods were adopted for passing messages secretly. But with the invention of internet and world wide web, which is used for communicating via mail, messages, online shopping, online banking, etc., increased the need of information security. Thus a proper understanding of various methods of cryptography and its implementation can fulfill the requirements of securing valuable a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 3 publications
(1 reference statement)
0
1
0
Order By: Relevance
“…However, the row round has different rotational constants for the ARX operations and takes six 32-bit inputs. Specifically, the rotational constants used in the row round are (13,16,17,21,5,8).…”
Section: E Echacha20 Row Roundmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the row round has different rotational constants for the ARX operations and takes six 32-bit inputs. Specifically, the rotational constants used in the row round are (13,16,17,21,5,8).…”
Section: E Echacha20 Row Roundmentioning
confidence: 99%
“…The ancient secret messaging techniques date back to Scytale, which the Spartans leveraged during the Persian War in the Third Century BC, and communication in 1084 BC during the fall of Troy [1]. While secret messaging techniques are seen to be very old, cryptography has itself taken quite several years to be independently invented [2,3,4,5]. For example, early inventions date back to Caesar's ciphers by Gaius Julius Caesar in epistolae (Letters from Caesar, which allowed messages to be transmitted based on the changed orders.…”
mentioning
confidence: 99%
“…Information encryption technology, as a computational method used to keep data confidential, was first used in the country's protection of political and military secret-related data [1]. Demand drives the development of technology, information encryption technology in the rapid development of computer technology has also been greatly developed today, the vast majority of today's information encryption is carried out for computer data.…”
Section: Introductionmentioning
confidence: 99%