Reference Hub3
The State-of-the-Art Cryptography Techniques for Secure Data Transmission

The State-of-the-Art Cryptography Techniques for Secure Data Transmission

Bhanu Chander
Copyright: © 2020 |Pages: 22
ISBN13: 9781799822424|ISBN10: 1799822427|EISBN13: 9781799822431
DOI: 10.4018/978-1-7998-2242-4.ch014
Cite Chapter Cite Chapter

MLA

Chander, Bhanu. "The State-of-the-Art Cryptography Techniques for Secure Data Transmission." Handbook of Research on Intrusion Detection Systems, edited by Brij B. Gupta and Srivathsan Srinivasagopalan, IGI Global, 2020, pp. 284-305. https://doi.org/10.4018/978-1-7998-2242-4.ch014

APA

Chander, B. (2020). The State-of-the-Art Cryptography Techniques for Secure Data Transmission. In B. Gupta & S. Srinivasagopalan (Eds.), Handbook of Research on Intrusion Detection Systems (pp. 284-305). IGI Global. https://doi.org/10.4018/978-1-7998-2242-4.ch014

Chicago

Chander, Bhanu. "The State-of-the-Art Cryptography Techniques for Secure Data Transmission." In Handbook of Research on Intrusion Detection Systems, edited by Brij B. Gupta and Srivathsan Srinivasagopalan, 284-305. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2242-4.ch014

Export Reference

Mendeley
Favorite

Abstract

Cryptography is a progression where message correspondences are intelligently sent from one abuser to an additional abuser which endows with frequent defense services like privacy, data truthfulness, or verification to the wireless transportation structure. An encryption method keeps exceptional crucial contribution to communication safety measures. Here we mentioned characteristics of various Symmetric and Asymmetric encryption techniques along with inclusion of optimization techniques in cryptography for decrease computation difficulty. Moreover, advanced encryption techniques such as Zero-knowledge, Multi-party, Homomorphism encryptions, and Cognitive cryptography, Blockchain with their associated protocols are described. The present day's extensive research practices on quantum computer machines explain mathematical tribulations which are complicated or stubborn for classical computers. Quantum cryptography, challenges, Goal of Quantum resistant cryptography with associated literature work is described.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.