ARCHIVES
Original Article
The Everyday Role of Cryptography: Securing Digital Life through Encryption and Authentication
Dr. Mohammed Iliyas1
Faculty, Department of Computer Science, Adikavi Sri Maharshi Valmiki University, Raichur, Karnataka, India.
Published Online: May-August 2025
Pages: 224-226
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20250402030References
1. Gutmann,P.(2004).EngineeringSecurity.https://www.cs.auckland.ac.nz/~pgut001/pubs/book.pdf
2. Marlinspike, M. (2013). The Signal Protocol. Open Whisper Systems.
3. Marlinspike, M. (2013). The Signal Protocol: Secure Messaging for Everyone. Open Whisper Systems.
4. Rescorla, E. (2001). SSL and TLS: Designing and Building Secure Systems. Addison-Wesley.
5. Shor, P. W. (1997). Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal
on Computing.
6. Verizon (2023).Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/dbir/
7. Cohn-Gordon, K., Cremers, C., Dowling, B., Garratt, L., & Stebila, D. (2016). A formal security analysis of the Signal messaging protocol.
IEEE European Symposium on Security and Privacy. https://doi.org/10.1109/EuroSP.2017.11
8. Durumeric, Z., Kasten, J., Adrian, D., Halderman, J. A., Bailey, M., Li, F., ... & Paxson, V. (2014). The matter of Heartbleed. Proceedings
of the 2014 Conference on Internet Measurement Conference, 475–488. https://doi.org/10.1145/2663716.2663755
9. Electronic Frontier Foundation. (2021). Surveillance Self-Defense: Secure Messaging Tools. https://ssd.eff.org
10. Kshetri, N. (2018). 1 The Emerging Role of Big Data in Key Development Issues: Opportunities, Challenges, and Concerns. Big Data for
Development, 1–12. https://doi.org/10.1007/978-3-319-99549-6_1
11. Marlinspike, M., & Perrin, T. (2016). The Signal Protocol. Open Whisper Systems. https://signal.org/docs/
12. PCI Security Standards Council. (2022). PCI DSS v4.0 Requirements and Security Assessment Procedures.
https://www.pcisecuritystandards.org
13. Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3. Internet Engineering Task Force (IETF) RFC 8446.
https://doi.org/10.17487/RFC8446
14. Symantec. (2017). Internet Security Threat Report. https://symantec-enterprise-blogs.security.com
15. Verizon. (2023). Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/dbir/.
16. Introduction to cryptography and network security, Behrouz.A.Forouzan, Published by Mc Graw-Hill, 2008.
2. Marlinspike, M. (2013). The Signal Protocol. Open Whisper Systems.
3. Marlinspike, M. (2013). The Signal Protocol: Secure Messaging for Everyone. Open Whisper Systems.
4. Rescorla, E. (2001). SSL and TLS: Designing and Building Secure Systems. Addison-Wesley.
5. Shor, P. W. (1997). Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal
on Computing.
6. Verizon (2023).Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/dbir/
7. Cohn-Gordon, K., Cremers, C., Dowling, B., Garratt, L., & Stebila, D. (2016). A formal security analysis of the Signal messaging protocol.
IEEE European Symposium on Security and Privacy. https://doi.org/10.1109/EuroSP.2017.11
8. Durumeric, Z., Kasten, J., Adrian, D., Halderman, J. A., Bailey, M., Li, F., ... & Paxson, V. (2014). The matter of Heartbleed. Proceedings
of the 2014 Conference on Internet Measurement Conference, 475–488. https://doi.org/10.1145/2663716.2663755
9. Electronic Frontier Foundation. (2021). Surveillance Self-Defense: Secure Messaging Tools. https://ssd.eff.org
10. Kshetri, N. (2018). 1 The Emerging Role of Big Data in Key Development Issues: Opportunities, Challenges, and Concerns. Big Data for
Development, 1–12. https://doi.org/10.1007/978-3-319-99549-6_1
11. Marlinspike, M., & Perrin, T. (2016). The Signal Protocol. Open Whisper Systems. https://signal.org/docs/
12. PCI Security Standards Council. (2022). PCI DSS v4.0 Requirements and Security Assessment Procedures.
https://www.pcisecuritystandards.org
13. Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3. Internet Engineering Task Force (IETF) RFC 8446.
https://doi.org/10.17487/RFC8446
14. Symantec. (2017). Internet Security Threat Report. https://symantec-enterprise-blogs.security.com
15. Verizon. (2023). Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/dbir/.
16. Introduction to cryptography and network security, Behrouz.A.Forouzan, Published by Mc Graw-Hill, 2008.
Related Articles
2025
Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions
2025
Exploring AI Techniques for Quantum Threat Detection and Prevention
2025
Maturity Models for Business Intelligence: An Overview
2025
INSPIRO: An AI Driven Institution Auditor
2025
Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems
2025