A Review of Some Popular Encryption Techniques

نویسندگان

  • Madhu Goel
  • Rupinder Kaur
چکیده

This paper focus on the different kinds of symmetric key encryption techniques those exist in present world for securing data communication. It also frames all the techniques related to variety of encryption like image encryption, information encryption, double encryption. It aims to explain the performance parameters that are used in encryption processes and analyzing on their security issues. It helps people to protect their sensitive information from thefts so considered as one of the best tool when it is transmitted via insecure communication channels.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review of Some Popular Hardware Implementation Techniques Implemented on Advanced Encryption Standard

This review Research paper concentrates on the different kinds of hardware implementation techniques that are exist. It also frames all the hardware implementation techniques together as a literature survey. The main Aim is the practical study of hardware implementation Techniques on Advanced Encryption Standard with the basis of various available encryption methods. Also it focuses on Throughp...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

A Survey Report on Video Encryption and Decryption Techniques

With the increase in the development of multimedia technologies, the multimedia data are transmitted in the various fields like commercial, video conferencing, medical and military fields, which generally include some sensitive data. Hence there is a great demand for transmission technique. Cryptography is becoming most popular for communication any type of sensitive data. There are various enc...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014