Encryption

Sruthi Medasani, Professor Tarik El Taeib

Abstract: Encryption is the most effective way to achieve data security. It is the process in which plain text converts into a cipher text and allows only authorized people to access the sender information. In this research paper I would like to explain different types of encryption techniques such as hashing function and symmetric and asymmetric methods with advantages and disadvantages including necessary practical examples.

Keywords: Encryption, Cryptography, Hashing, Asymmetric, Symmetric, Cipher text

Title: Encryption

Author: Sruthi Medasani, Professor Tarik El Taeib,

International Journal of Computer Science and Information Technology Research

ISSN 2348-1196 (print), ISSN 2348-120X (online)

Research Publish Journals

Vol. 3, Issue 1, January 2015 - March 2015

Citation
Share : Facebook Twitter Linked In

Citation
Encryption by Sruthi Medasani, Professor Tarik El Taeib