Data Encryption & Decryption - A Review

Abstract

The art of obtaining security by converting readable messages into non-readable is called Cryptography. It is the process of hiding secret information. The normal text also called plain text is visible and readable to all. To provide security to some important messages we need to encode the text called cipher text. The contents of cipher text are visible to everyone but they are not readable. Cryptography is a branch of computer science, information theory and mathematics whose main task is to codify the given information so that it is not easily understood by unauthorized users. It is used numerous applications for providing security for transmitted data. In this paper, we provide review of various types of cryptography techniques.

Authors and Affiliations

Hema Arora, Anil Arora

Keywords

Related Articles

ew Machine Learning Crawling Algorithm For Web Forums

In this paper, we present FoCUS (Forum Crawler Under Supervision), a supervised web-scale forum crawler. The goal of FoCUS is to only trawl relevant forum content from the web with minimal overhead. Forum threads contai...

Automatic Tablet Filler Using PLC

The project entitled “Automatic tablet filler using PLC” is an automating tablet filling processes in pharmaceutical companies. It differs from present tablet filling machines used in the industries in various aspects s...

slugAdvanced Chord Algorithm

Network is a peer to peer (P2P) increasing popularity and now over a day. Systems on top of peer-peer overlay network abstraction of the machine or the physical network topology. Networks for structured and unstructured...

Secure Deduplication with Authorized Duplicate Check Using Convergent Encryption in Cloud

Increased growth of cloud storage turns the focus of cloud service providers to save their resources to earn more profit by renting them to the multiple cloud users. One of the main factors that utilizes more space and...

Android Controlled Robot for Monitoring the Visually Challenged

In the present generation the gap between machines and humans is being condensed with the introduction of new technologies to free from trouble the standard of living. This paper analyses the motion technology to captur...

Download PDF file
  • EP ID EP24030
  • DOI -
  • Views 308
  • Downloads 10

How To Cite

Hema Arora, Anil Arora (2017). Data Encryption & Decryption - A Review. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24030