A Survey on Cryptography Sarika Nyaramneni 1 , S.Yashwanth Sai 2 , Talluri Nikhitha Devi 3 , Tejeswara Murthy Palwadi 4 and Vibudi Durga Vara Prasad 5 1 Assistant Professor, Department of CSE, VNR Vignana Jyothi Institute of Engineering and Technology Email: - sarika_n@vnrvjiet.in 2-5 Undergraduate Student, Department of CSE, VNR Vignana Jyothi Institute of Engineering and Technology Email: {www.sai1929, nikhitha3122, tejeswarmurthypalwadi, durgavaraprasad51}@gmail.com Abstract— This survey presents a comprehensive examination of diverse encryption and decryption techniques, encompassing historical methods like DES to modern approaches such as elliptic curve cryptography and genetic algorithms applied to 3-DES encryption. The paper explores the operational principles, security features, and practical considerations of each cryptographic method, shedding light on strengths, potential vulnerabilities, and real-world applicability. Key aspects such as encryption and decryption efficiency, security mechanisms, and the interplay between symmetric and asymmetric cryptography are addressed. The survey aims to guide researchers, practitioners, and policymakers in making informed decisions for robust and secure data communication and storage. Additionally, the paper identifies potential areas for future research, emphasizing advanced encryption techniques, secure key management, and the integration of cryptographic methods to address emerging challenges in data security. Index Terms— AES, DES, RSA, 3-DES, Elliptical Curve Cryptography, Substitution Ciphers. I. INTRODUCTION Encryption and decryption stand as the bedrock of modern information security, forming the bulwark that shields sensitive data from prying eyes and malicious actors in an interconnected digital landscape. Encryption, the process of converting plaintext into ciphertext using complex algorithms, renders information unreadable to unauthorized entities. Decryption, its counterpart, reverses this process, converting ciphertext back into its original plaintext form, allowing authorized parties access to the information. This symbiotic duo operates through sophisticated mathematical algorithms and keys, where encryption transforms data into an unintelligible form, while decryption retrieves the original content using designated keys. Over time, encryption methodologies have evolved from ancient ciphers to intricate cryptographic protocols, constantly adapting to meet the escalating challenges posed by advancing technologies and evolving threats. Their significance spans across numerous domains, safeguarding financial transactions, protecting sensitive communications, fortifying healthcare records, and ensuring the integrity of government and military data. Understanding the principles, evolution, and applications of encryption and decryption is fundamental in comprehending the cornerstone they lay in maintaining confidentiality, integrity, and authenticity in the digital age. In the digital age where information is omnipresent and data security paramount, the fields of encryption and decryption stand as pillars in fortifying the integrity, confidentiality, and authenticity of sensitive information. The Grenze ID: 01.GIJET.10.2.139 © Grenze Scientific Society, 2024 Grenze International Journal of Engineering and Technology, June Issue