ARCHIVES

Original Article

The Everyday Role of Cryptography: Securing Digital Life through Encryption and Authentication

Dr. Mohammed Iliyas1
Faculty, Department of Computer Science, Adikavi Sri Maharshi Valmiki University, Raichur, Karnataka, India.

Published Online: May-August 2025

Pages: 224-226

References

1. Gutmann,P.(2004).EngineeringSecurity.https://www.cs.auckland.ac.nz/~pgut001/pubs/book.pdf
2. Marlinspike, M. (2013). The Signal Protocol. Open Whisper Systems.
3. Marlinspike, M. (2013). The Signal Protocol: Secure Messaging for Everyone. Open Whisper Systems.
4. Rescorla, E. (2001). SSL and TLS: Designing and Building Secure Systems. Addison-Wesley.
5. Shor, P. W. (1997). Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal
on Computing.
6. Verizon (2023).Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/dbir/
7. Cohn-Gordon, K., Cremers, C., Dowling, B., Garratt, L., & Stebila, D. (2016). A formal security analysis of the Signal messaging protocol.
IEEE European Symposium on Security and Privacy. https://doi.org/10.1109/EuroSP.2017.11
8. Durumeric, Z., Kasten, J., Adrian, D., Halderman, J. A., Bailey, M., Li, F., ... & Paxson, V. (2014). The matter of Heartbleed. Proceedings
of the 2014 Conference on Internet Measurement Conference, 475–488. https://doi.org/10.1145/2663716.2663755
9. Electronic Frontier Foundation. (2021). Surveillance Self-Defense: Secure Messaging Tools. https://ssd.eff.org
10. Kshetri, N. (2018). 1 The Emerging Role of Big Data in Key Development Issues: Opportunities, Challenges, and Concerns. Big Data for
Development, 1–12. https://doi.org/10.1007/978-3-319-99549-6_1
11. Marlinspike, M., & Perrin, T. (2016). The Signal Protocol. Open Whisper Systems. https://signal.org/docs/
12. PCI Security Standards Council. (2022). PCI DSS v4.0 Requirements and Security Assessment Procedures.
https://www.pcisecuritystandards.org
13. Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3. Internet Engineering Task Force (IETF) RFC 8446.
https://doi.org/10.17487/RFC8446
14. Symantec. (2017). Internet Security Threat Report. https://symantec-enterprise-blogs.security.com
15. Verizon. (2023). Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/dbir/.
16. Introduction to cryptography and network security, Behrouz.A.Forouzan, Published by Mc Graw-Hill, 2008.

Related Articles

2025

Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions

2025

Exploring AI Techniques for Quantum Threat Detection and Prevention

2025

Maturity Models for Business Intelligence: An Overview

2025

INSPIRO: An AI Driven Institution Auditor

2025

Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems

2025

Predictive Modeling for College Admission Using Machine Learning and Statistical Methods

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20250402030

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.