Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Information Technology Journal
  Year: 2004 | Volume: 3 | Issue: 1 | Page No.: 106-132
DOI: 10.3923/itj.2004.106.132
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Data Security and Cryptographic Techniques: A Review

Kefa Rabah

Abstract:
Since almost the beginning of time, it seems, man has had a need to keep information private and, in many situations, needed to decipher information previously made private by others. In our age of high technology these needs have grown exponentially and become more complex. Today, computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re-routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulations: the ability to tax and control economic interactions, the ability to keep information secret and will even alter the nature of trust and reputation. All this will depend on how secure data can be moved from point-to-point from LAN to Global network data exchange. It is recognized that encryption (otherwise known as scrambling, enciphering or privacy transformation) represents the only means of protecting such data during transmission and, a useful means of protecting the content of data stored on various media, provided encryption of adequate strength can be devised and validated and is inherently integrable into network system architecture.
PDF References Citation Report Citation
 RELATED ARTICLES:
  •    An Experiment on the Level of Trust in an Expanded Investment Game
How to cite this article:

Kefa Rabah , 2004. Data Security and Cryptographic Techniques: A Review. Information Technology Journal, 3: 106-132.

DOI: 10.3923/itj.2004.106.132

URL: https://scialert.net/abstract/?doi=itj.2004.106.132

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom