A Review Paper on Cryptography for Data Security

Abstract

Cryptography is the technique with which we can convert the message into secret text which is not understandable to unauthorized users. It is the technique for hiding data and information from unauthorized users. When we send simple message from one location to another then this message called plain text is visible to anybody. We can use one of numerous cryptography methods for converting the plain text into cipher text. There are number of applications where such techniques are used in real life. In this paper we provide review of various types of cryptography techniques.

Authors and Affiliations

Pooja

Keywords

Related Articles

A Survey on Routing Protocols and Vulnerabilities in Mobile Ad-Hoc Network (MANETs)

Mobile ad hoc network (MANET) is composed of a collection of mobile nodes which are movable. Therefore, dynamic topology, unstable links, limited energy capacity and absence of fixed infrastructure are special features...

Data Mining Challenges With Big Data

Data analysis is a clear bottleneck in many applications, both due to lack of scalability of the underlying algorithms and due to the complexity of the data that needs to be analyzed. The value of data explodes when it...

Network programming in Java using Socket

This paper describes about Network programming using java. The Network programming is similar to socket programming or Client-Server programming. Where Socket programming is important to understand how internet based i...

A Study on Women Empowerment through SelfHelp Groups with Special Reference to Ghaziabad in Uttar Pradesh District

women’s empowerment is a much debated topic, which has many aspects to it. It is not only multidimensional in approach, but also helps one understand that, when women are empowered, they gain self confidence and actuali...

Effect of Growth Promoter on the Total Bacterial Load in Anabas testudineus Culture Ponds

This study was conducted to observe the total bacteria present in water and soil sample of thai koi, Anabas testudineus research ponds located behind the 1st academic building of Khulna University, Khulna, Bangladesh du...

Download PDF file
  • EP ID EP24073
  • DOI -
  • Views 256
  • Downloads 11

How To Cite

Pooja (2017). A Review Paper on Cryptography for Data Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24073