Encryption Algorithms Used for Secured Communication

Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 12

Abstract

With the development of the digital devices, computers and networks, our world relies more and more on the digital data. In many cases, storing data safely is a very big concern. These data have to be protected so as to prevent the possible unauthorized access. Many technologies have been used to improve the security of the data storage. Encryption is a process of coding information which could either be a file or mail message in into cipher text a form unreadable without a decoding key in order to prevent anyone except the intended recipient from reading that data. Decryption is the exactly opposite process of converting encoded data to its original un-encoded form which is nothing but plaintext. Here we are introducing some encryption algorithms.

Authors and Affiliations

Keywords

Related Articles

Factors Affecting the Process of Teaching with Students in Nursing School

Introduction: Teaching is an interactive process between the lecturer and students. In this study, we analyzed the possible factors that influence the quality of teaching in our Nursing School. Material and Methods: The...

High Boost Ratio Hybrid Transformer DC-DC Converter for PV Grid Applications

Attempts were made by scientists for utilizing solar power. Solar drives, solar water heater, solar concentrators are some examples. Recently because of energy shortage green gas effect, attention was given for generatin...

Production of Indole Acetic Acid (IAA) by Stenotrophomonas Maltophilia BE25 Isolated from Roots of Banana (musa spp)

Abstract: In the present study based on morphological, cultural, biochemical and 16s rRNA gene sequencing a newly isolated endophytic bacterium from the root of the banana (musa spp) was identified as Stenotrophomonas ma...

Phytochemical Constituents of some Medicinal Plants

Phytochemical Constituents of some Medicinal Plants

Finite Element Analysis of Pin-on-Disc Tribology Test

The main objective of this work was to evaluate the state of stress and strain in Pin-on-Disc (POD) tribology test setup with of 316LN austenitic stainless steel as the tribo elements under self-mated conditions using fi...

Download PDF file
  • EP ID EP339082
  • DOI -
  • Views 76
  • Downloads 0

How To Cite

(2013). Encryption Algorithms Used for Secured Communication. UNKNOWN, 2(12), -. https://europub.co.uk/articles/-A-339082