Encryption Research Paper

Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vital information in a secret way. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, nonrepudiation. The security of communication is a crucial issue on World Wide Web. It is about confidentiality, integrity, authentication during access or editing of confidential internal documents.

  • 1.

    Lu, D.: Computer Cryptography, Computer network data privacy and security. Tsinghua University Press (1998)Google Scholar

  • 2.

    Li, K., Wang, D., Dong, X.: Practical Cryptography and computer data security. Northeastern University Press (1997)Google Scholar

  • 3.

    Yang, Y., Sun, W.: Modon cryptography new theory. Science Press, Beijing (2001)Google Scholar

  • 4.

    Schneier, B.: Application Cryptography - Protocols, Algorithms and C source code. Machinery Industry Press (2000)Google Scholar

  • 5.

    Huang, Y., Chen, L., Tang, S.: Information security and encryption decryption core technology. Electronic Press (2001)Google Scholar

  • 6.

    Li, S., Wang, D.: Modern Cryptography Theory, Method and frontier. Science Press, Beijing (2009)Google Scholar

  • 7.

    Manzanares, A.I., Sierra, C.J.M., Marquez, J.T.: On the imp lementation of security policies with adaptative encryption. Computer Communications 29(2), 2750–2758 (2006)CrossRefGoogle Scholar

  • 8.

    Vaudenay, S.: On the Weak Keys of Blowfish. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 27–32. Springer, Heidelberg (1996)Google Scholar

  • 0 Thoughts to “Encryption Research Paper

    Leave a comment

    L'indirizzo email non verrà pubblicato. I campi obbligatori sono contrassegnati *