A Comparative Survey on Cryptology-Based Methodologies

  • Authors:
  • Ming Yang;Allan Rwabutaza;Nikolaos Bourbakis

  • Affiliations:
  • Southern Polytechnic State University, USA;ATR Center, Wright State University, USA;ATR Center, Wright State University, USA

  • Venue:
  • International Journal of Information Security and Privacy
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security is an important issue related to the storage and communication of data and information. In data and information security, cryptography and steganography are two of the most common security techniques. On one hand, there is cryptography, which is the secret communication between two parties by message scrambling on the sender's side and message unscrambling on the receiver's side so that only the intended receiver gets the secret message. Cryptography and cryptanalysis constitute cryptology or crypto while steganography and steganalysis make up steganology or stegano. This paper presents a comparative survey of various cryptology and steganology techniques by analyzing and comparing different methodologies using a set of predefined parameters. It also offers to the reader valuable knowledge on the state of the art techniques used on cryptanalysis.