Review of Various Encryption Algorithms
Keywords:
encryption, algorithms, software2019;s, behaviors
Abstract
Advancement in technology dictates that information security, user data integrity and security be paramount to protect user information and data from vulnerabilities from malicious intruders- third parties. Need is therefore a factor for information systems to secure user data and information. The concept data encryption ensures that user data is unreadable to third parties keeping their information more safe and secure while using the internet. A lot information on security has been provided by both the physical security and operating system security but neither of these methods have successfully and sufficiently provided a secure mechanism and support on storing and processing of user data and information. This paper reviews the various encryption algorithms that are employed to protect user information and data against various vulnerabilities.
Downloads
- Article PDF
- TEI XML Kaleidoscope (download in zip)* (Beta by AI)
- Lens* NISO JATS XML (Beta by AI)
- HTML Kaleidoscope* (Beta by AI)
- DBK XML Kaleidoscope (download in zip)* (Beta by AI)
- LaTeX pdf Kaleidoscope* (Beta by AI)
- EPUB Kaleidoscope* (Beta by AI)
- MD Kaleidoscope* (Beta by AI)
- FO Kaleidoscope* (Beta by AI)
- BIB Kaleidoscope* (Beta by AI)
- LaTeX Kaleidoscope* (Beta by AI)
How to Cite
Published
2019-01-15
Issue
Section
License
Copyright (c) 2018 Authors and Global Journals Private Limited
![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution 4.0 International License.