A Review of Some Popular Encryption Techniques
نویسندگان
چکیده
This paper focus on the different kinds of symmetric key encryption techniques those exist in present world for securing data communication. It also frames all the techniques related to variety of encryption like image encryption, information encryption, double encryption. It aims to explain the performance parameters that are used in encryption processes and analyzing on their security issues. It helps people to protect their sensitive information from thefts so considered as one of the best tool when it is transmitted via insecure communication channels.
منابع مشابه
A Review of Some Popular Hardware Implementation Techniques Implemented on Advanced Encryption Standard
This review Research paper concentrates on the different kinds of hardware implementation techniques that are exist. It also frames all the hardware implementation techniques together as a literature survey. The main Aim is the practical study of hardware implementation Techniques on Advanced Encryption Standard with the basis of various available encryption methods. Also it focuses on Throughp...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملA Survey Report on Video Encryption and Decryption Techniques
With the increase in the development of multimedia technologies, the multimedia data are transmitted in the various fields like commercial, video conferencing, medical and military fields, which generally include some sensitive data. Hence there is a great demand for transmission technique. Cryptography is becoming most popular for communication any type of sensitive data. There are various enc...
متن کاملOverview of Intrusion Detection Techniques in Database
Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...
متن کامل