A Comparative Survey on Cryptology-Based Methodologies
Allan Rwabutaza,
Ming Yang and
Nikolaos Bourbakis
Additional contact information
Allan Rwabutaza: ATR Center, Wright State University, USA
Ming Yang: Southern Polytechnic State University, USA
Nikolaos Bourbakis: ATR Center, Wright State University, USA
International Journal of Information Security and Privacy (IJISP), 2012, vol. 6, issue 3, 1-37
Abstract:
Security is an important issue related to the storage and communication of data and information. In data and information security, cryptography and steganography are two of the most common security techniques. On one hand, there is cryptography, which is the secret communication between two parties by message scrambling on the sender’s side and message unscrambling on the receiver’s side so that only the intended receiver gets the secret message. Cryptography and cryptanalysis constitute cryptology (or crypto) while steganography and steganalysis make up steganology (or stegano). This paper presents a comparative survey of various cryptology and steganology techniques by analyzing and comparing different methodologies using a set of predefined parameters. It also offers to the reader valuable knowledge on the state of the art techniques used on cryptanalysis.
Date: 2012
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 4018/jisp.2012070101 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jisp00:v:6:y:2012:i:3:p:1-37
Access Statistics for this article
International Journal of Information Security and Privacy (IJISP) is currently edited by Yassine Maleh
More articles in International Journal of Information Security and Privacy (IJISP) from IGI Global
Bibliographic data for series maintained by Journal Editor ().