Review of Various Encryption Algorithms

α
Neyole Misiko
Neyole Misiko
σ
Neymis Misiko Jacob
Neymis Misiko Jacob
α Umma University

Send Message

To: Author

Review of Various Encryption Algorithms

Article Fingerprint

ReserarchID

CSTNWS0CI66

Review of Various Encryption Algorithms Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Advancement in technology dictates that information security, user data integrity and security be paramount to protect user information and data from vulnerabilities from malicious intruders-third parties. Need is therefore a factor for information systems to secure user data and information. The concept data encryption ensures that user data is unreadable to third parties keeping their information more safe and secure while using the internet. A lot information on security has been provided by both the physical security and operating system security but neither of these methods have successfully and sufficiently provided a secure mechanism and support on storing and processing of user data and information. This paper reviews the various encryption algorithms that are employed to protect user information and data against various vulnerabilities.

References

13 Cites in Article
  1. C Bradford (2016). Secured steganography methodology using combined encryption and quick response codes.
  2. Priyanka Arora,Arun Singh,Himanshu Tyagi (2014). Evaluation and Comparison of Security Issues on Cloud Computing Environment.
  3. Charles Pfleeger,Shari Lawrence (2006). Making Good Encryption Algorithms.
  4. Rajdeep Bhanot,Rahul Hans (2015). A Review and Comparative Analysis of Various Encryption Algorithms.
  5. . Rejani (2015). Study of Symmetric key Cryptography Algorithms.
  6. M Rouse (2006). Brute force cracking. Retrieved from TechTarget network of technology.
  7. G Heward (2014). Birthday attacks through quadrisection.
  8. Md,Md Alam Hossain,Md Biddut Hossain,Shariar Shafin Uddin,Md,Imtiaz (2016). Performance Analysis of Different Cryptography Algorithms.
  9. G Kessler (2017). An Overview of Cryptography.
  10. Thomas Neubauer,Johannes Heurix (2011). A methodology for the pseudonymization of medical data.
  11. J Neyole (2015). Vulnerability of data security using MD5 function in php database design.
  12. Prerna Mahajan,Abhishek Sachdeva (2013). A Study of Encryption Algorithms AES, DES and RSA for Security.
  13. V Priti,Kaustubh Bhagat,Satpute,R Vikas,Palekar (2013). Reverse Encryption.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Neyole Misiko. 2019. \u201cReview of Various Encryption Algorithms\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 19 (GJCST Volume 19 Issue E1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification: I.1.m
Version of record

v1.2

Issue date

February 7, 2019

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 5209
Total Downloads: 1505
2026 Trends
Related Research

Published Article

Advancement in technology dictates that information security, user data integrity and security be paramount to protect user information and data from vulnerabilities from malicious intruders-third parties. Need is therefore a factor for information systems to secure user data and information. The concept data encryption ensures that user data is unreadable to third parties keeping their information more safe and secure while using the internet. A lot information on security has been provided by both the physical security and operating system security but neither of these methods have successfully and sufficiently provided a secure mechanism and support on storing and processing of user data and information. This paper reviews the various encryption algorithms that are employed to protect user information and data against various vulnerabilities.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Review of Various Encryption Algorithms

Neymis Misiko Jacob
Neymis Misiko Jacob

Research Journals