Cryptography is an old idea and science, but its approach exists and plays a large role in modernization today. Conventional cryptographic techniques form the basis of today's cryptographic algorithm. The different categories of algorithms have their respective features; internally, in performance and implementation. Cryptographic schemes and mechanisms have undergone continuous improvement. The application of cryptography has grown increasingly, ranging from limited use in state institutions to widespread use by private individuals and companies. The increased use of the Internet has significantly influenced the nature of applications and the way we communicate. Data security dictates the use of different cryptographic techniques. For this reason, we analyze in detail the various coding techniques by evaluating their performance and efficiency. Regarding the new paradigms in cryptography there are also new cryptographic schemes whose application requires detailed study and analysis. The classical cryptography algorithm is the oldest algorithm that was used long before the cryptographic system was discovered. Currently, the system has been widely applied to secure data, and using new methods in a way to improve existing methods. In this thesis the use of cryptographic methods using the C # programming language will be discussed.
Albahari, J., Albahari, B. (2012). C# 7.0 in a Nutshell: ISBN: 1491987650 ISBN13: 9781491987650 ASIN: 1491987650.
Schneier B. (2006), Applied Cryptog-raphy, Second Edition: Protocols, Algo-rithms, and Source Code in C (cloth) ISBN: 0471128457, Publication 1996.
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanston. (1997). Handbook of Applied Cryptography, ISBN: 0-8493-8523-7-1996.
Denning, Dorothy E, (1999). Information Warefare and Security, Addison-Wesly, ISBN 0-201-43303-6.Introduction to Cyber Information warfare.
Stallings, W. (2006), Cryptography and Network Security Principles and Practices, Fourth Edition. Pub. November 16, 2005 Print ISBN-10, 0-13-187316-4 Print ISBN-13 978-0-13-187316-2.
Kelsey,J., Schneier,B., and Hall, C. (1998),"Cryptanalytic Attacks on Pseu-dorandom Number Generators. "Proceed-ings, Fast Software Encryption. http://www.schneier.com/paper-prngs.htm
Oppliger, R., and Rytz, R. (2005), "Does Trusted Computing Remedy Computer Se-curity Problems?" IEEE, Security and Priva-cy, March/April 2005.
Biham, E., and Shamir, A. (2000)"Power Analysis of the Key Scheduling of the AES Candidates" Proceedings, Second AES Can-didate Conference, 24 October 2000.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright (c) 2020 Array