Data Encryption & Decryption - A Review

Abstract

The art of obtaining security by converting readable messages into non-readable is called Cryptography. It is the process of hiding secret information. The normal text also called plain text is visible and readable to all. To provide security to some important messages we need to encode the text called cipher text. The contents of cipher text are visible to everyone but they are not readable. Cryptography is a branch of computer science, information theory and mathematics whose main task is to codify the given information so that it is not easily understood by unauthorized users. It is used numerous applications for providing security for transmitted data. In this paper, we provide review of various types of cryptography techniques.

Authors and Affiliations

Hema Arora, Anil Arora

Keywords

Related Articles

Transient thermal analysis of modified emergency container

Conventional emergency containers used in steel industry are of less capacity and they had to line with refractory lining which is not economical and time killing process and even the material used for the container is...

Active Power Loss Minimization Using Simultaneous Network Reconfiguration and DG Placement with AGPSO Algorithm

This paper presents a new approach has been proposed to solve network reconfiguration in the presence of distributed generation (DG) in distribution system with an objective of minimization real power loss and improving...

Non contactActive Vibration control of Cantilever Beam Using Neural Networking

The aim of this study is to propose an active non-contact vibration damper to minimize the amplitude vibration of structure. The damper is made of an electromagnet. A neural network control system is proposed in this st...

Special pairs of rectangles and sphenic number

We present pairs of Rectangles, such that in each pair, the sum of their areas is two times the Sphenic number minus one. Also we present the number of pairs of primitive and non-primitive rectangles.

Intelligent D2D Communication Using Internet of Things

Over the traditional home device in our daily life, the technology will get our life to next generation home automation. The proposed system work on sensor and mobile device to give an intelligent solution for needs, th...

Download PDF file
  • EP ID EP24030
  • DOI -
  • Views 253
  • Downloads 10

How To Cite

Hema Arora, Anil Arora (2017). Data Encryption & Decryption - A Review. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24030