Abstract: The scope of the establishment of internetworking security is large enough that requires special attention to details to realize its ultimate wholesome state. As soon as the Data/Information is placed in a medium to transmit over to the next hop, it is at risk of being fabricated by the Man-in-the-middle. Over the years many encryption/decryption algorithms were invented to ensure the integrity and authenticity of the content co compiled at the sender end. Cryptography is a subset of cryptography that only deals with encrypting data that can be passed through secure channels along with keys to ensure security.......
Key Word: Cryptology, Cryptography, Crptanalysis, Symmetric Key Encryption, Assymetric Key Encryption, Man-in-the-middle.
[1]. https://techblogs.42gears.com/encrypt-and-decrypt-a-message-using-des-algorithm-in-python/
[2]. Maqsood, F., Ahmed, M., Ali, M. M., & Shah, M. A. (2017). Cryptography: a comparative analysis for modern techniques. International Journal of Advanced Computer Science and Applications, 8(6).
[3]. Hercigonja, Z. (2016). Comparative analysis of cryptographic algorithms. International Journal of Digital Technology & Economy, 1(2), 127-134.
[4]. Jeeva, A. L., Palanisamy, D. V., & Kanagaram, K. (2012). Comparative analysis of performance efficiency and security measures of some encryption algorithms. International Journal of Engineering Research and Applications (IJERA), 2(3), 3033-3037.
[5]. Thambiraja, E., Ramesh, G., & Umarani, D. R. (2012). A survey on various most common encryption techniques. International journal of advanced research in computer science and software engineering, 2(7).