A Review Paper on Cryptography for Data Security

Abstract

Cryptography is the technique with which we can convert the message into secret text which is not understandable to unauthorized users. It is the technique for hiding data and information from unauthorized users. When we send simple message from one location to another then this message called plain text is visible to anybody. We can use one of numerous cryptography methods for converting the plain text into cipher text. There are number of applications where such techniques are used in real life. In this paper we provide review of various types of cryptography techniques.

Authors and Affiliations

Pooja

Keywords

Related Articles

Implementation of Enhancement of Apriori Algorithm

As with the advancement of the IT technologies, the amount of accumulated data is also increasing. It has resulted in large amount of data stored in databases, warehouses and other repositories. Thus the Data mining com...

Resistance Spot Welding with Nickel Plated Electrode caps

Resistance spot welding has established itself across a wide range of industries as a cost-effective method for welding. One of the problems of Resistance Spot Welding is the lifetime of welding electrode tips which aff...

Information Security and Data Hiding

As the numbers of attacks increasing during transmission of information between the originate and target place, therefore need arises some secure methods which are free from different types of attacks. Two popular metho...

Analysis and Comparative Study of Theoretical and Practical Air Breakdown Voltages between Spherical Electrodes

Growth in power sector of nation is a challenge for power engineers for the protection of sensitive power equipments and their reliable operation. The major challenges in high voltage (HV) power equipments include the q...

3D Simulation of Real-Time Tracking of Flights in ATC

Using 3D simulation technique real-time flight tracking and guiding for the pilot is done for the convenience of the Air Traffic Controller. The job of the air traffic controller is very technical and very stressful. Th...

Download PDF file
  • EP ID EP24073
  • DOI -
  • Views 260
  • Downloads 11

How To Cite

Pooja (2017). A Review Paper on Cryptography for Data Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24073