Analysis of Encryption Approaches And Varieties

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2021 by IJCOT Journal
Volume - 11 Issue - 1
Year of Publication : 2021
Authors :  Sumaiyh Bani Oraba, Malak Saleh Mohammed Al-Hizami, Amira Abdullah Al-Jaafariya, Sumaiyh Bani Oraba, Ramesh Palanisamy
DOI : 10.14445/22492593/IJCOT-V11I1P301

Citation

MLA Style:Sumaiyh Bani Oraba, Malak Saleh Mohammed Al-Hizami, Amira Abdullah Al-Jaafariya, Sumaiyh Bani Oraba, Ramesh Palanisamy  "Analysis of Encryption Approaches And Varieties" International Journal of Computer and Organization Trends 11.1 (2021): 1-3. 

APA Style:Sumaiyh Bani Oraba, Malak Saleh Mohammed Al-Hizami, Amira Abdullah Al-Jaafariya, Sumaiyh Bani Oraba, Ramesh Palanisamy(2021). Analysis of Encryption Approaches And Varieties International Journal of Computer and Organization Trends, 11(1), 1-3.

Abstract

We live in an accelerated world of technological advancement. The world has now witnessed an evolution that is increasing day by day. But there are many hackers for this technology. So, we must protect the data that we use in this technology from any attack. Encryption techniques are the essential technologies that help to protect Data. Encryption techniques are in which data are encapsulated and cannot read by the attacker. These make it difficult for an attacker to crack the encryption used. Encrypted text can only read when it reaches the recipient. Several keys are used to encrypt and decrypt data. This paper covers encryption methodologies, what types of encryption algorithms, and how we can protect data from attack

References

[1] https://www.edu.gov.mb.ca/k12/cur/obaida Mohammad awad al-hazaimeh," a new approach for complex encrypting and decrypting data," international journal of computer networks & communications (ijcnc) vol.5, no.2, march 2013.
[2] Ezeofor C. J.1, Ulasi A. G.2," Analysis of Network Data Encryption & Decryption Techniques in Communication Systems", International Journal of Innovative Research in Science, Engineering, and Technology (An ISO 3297: 2007 Certified Organization)Vol. 3, Issue 12, December 2014.
[3] Mohammad Ubaidullah Bokhari & Qahtan Makki Shallal,” A Review on Symmetric Key Encryption Techniques in Cryptography, "International Journal of Computer Applications (0975 – 8887) Volume 147 – No.10, August 2016.
[4] Okeke Stephen," The Study of the Application of Data Encryption Techniques in Cloud Storage to Ensure Stored Data Integrity and Availability," International Journal of Scientific and Research Publications, Volume 4, Issue 10, October 2014.
[5] N.krishna Chaitanya, A.Suman Kumar Reddy," Simple And Efficient Data Encryption Algorithm" INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019.
[6] Dr. Prerna Mahajan & Abhishek Sachdeva," A Study of Encryption Algorithms AES, DES and RSA for Security," Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 the Year 2013.
[7] Indumathi Saikumar, "DES- Data Encryption Standard," International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 03 | Mar -2017.
[8] Ayushi A Symmetric Key Cryptographic Algorithm", ©2010 International Journal of Computer Applications (0975 - 8887)Volume 1 – No. 15.
[9] Article by Mahendra Kumar Shrivas1, Antwi Baffour Boasiako2, Sangeetha Krishanan3, Thomas Yeboah4," Enhanced Simplified Symmetric Key Encryption Algorithm," Texila International Journal of Academic Research Volume 3, Issue 2, Dec 2016.
[10] Poornachander V#," Security Issues on Cryptography and Network Security," Poornachander V / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (3), 2016, 1648-1654.
[11] Gahan A V 1, Geetha D Devanagavi2," An Empirical Study of Security Issues In Encryption Techniques," International Journal of Applied Engineering Research ISSN 0973-4562 Volume 14, Number 5 (2019) pp.

Keywords
Encryption, algorithms, symmetric, asymmetric