A Survey on Cryptography
Sarika Nyaramneni
1
, S.Yashwanth Sai
2
, Talluri Nikhitha Devi
3
, Tejeswara Murthy Palwadi
4
and
Vibudi Durga Vara Prasad
5
1
Assistant Professor, Department of CSE, VNR Vignana Jyothi Institute of Engineering and Technology
Email: - sarika_n@vnrvjiet.in
2-5
Undergraduate Student, Department of CSE, VNR Vignana Jyothi Institute of Engineering and Technology
Email: {www.sai1929, nikhitha3122, tejeswarmurthypalwadi, durgavaraprasad51}@gmail.com
Abstract— This survey presents a comprehensive examination of diverse encryption and
decryption techniques, encompassing historical methods like DES to modern approaches such as
elliptic curve cryptography and genetic algorithms applied to 3-DES encryption. The paper
explores the operational principles, security features, and practical considerations of each
cryptographic method, shedding light on strengths, potential vulnerabilities, and real-world
applicability. Key aspects such as encryption and decryption efficiency, security mechanisms, and
the interplay between symmetric and asymmetric cryptography are addressed. The survey aims
to guide researchers, practitioners, and policymakers in making informed decisions for robust
and secure data communication and storage. Additionally, the paper identifies potential areas for
future research, emphasizing advanced encryption techniques, secure key management, and the
integration of cryptographic methods to address emerging challenges in data security.
Index Terms— AES, DES, RSA, 3-DES, Elliptical Curve Cryptography, Substitution Ciphers.
I. INTRODUCTION
Encryption and decryption stand as the bedrock of modern information security, forming the bulwark that shields
sensitive data from prying eyes and malicious actors in an interconnected digital landscape. Encryption, the process
of converting plaintext into ciphertext using complex algorithms, renders information unreadable to unauthorized
entities. Decryption, its counterpart, reverses this process, converting ciphertext back into its original plaintext
form, allowing authorized parties access to the information.
This symbiotic duo operates through sophisticated mathematical algorithms and keys, where encryption transforms
data into an unintelligible form, while decryption retrieves the original content using designated keys. Over time,
encryption methodologies have evolved from ancient ciphers to intricate cryptographic protocols, constantly
adapting to meet the escalating challenges posed by advancing technologies and evolving threats. Their
significance spans across numerous domains, safeguarding financial transactions, protecting sensitive
communications, fortifying healthcare records, and ensuring the integrity of government and military data.
Understanding the principles, evolution, and applications of encryption and decryption is fundamental in
comprehending the cornerstone they lay in maintaining confidentiality, integrity, and authenticity in the digital
age.
In the digital age where information is omnipresent and data security paramount, the fields of encryption and
decryption stand as pillars in fortifying the integrity, confidentiality, and authenticity of sensitive information. The
Grenze ID: 01.GIJET.10.2.139
© Grenze Scientific Society, 2024
Grenze International Journal of Engineering and Technology, June Issue