Advancement in technology dictates that information security, user data integrity and security be paramount to protect user information and data from vulnerabilities from malicious intruders- third parties. Need is therefore a factor for information systems to secure user data and information. The concept data encryption ensures that user data is unreadable to third parties keeping their information more safe and secure while using the internet. A lot information on security has been provided by both the physical security and operating system security but neither of these methods have successfully and sufficiently provided a secure mechanism and support on storing and processing of user data and information. This paper reviews the various encryption algorithms that are employed to protect user information and data against various vulnerabilities.

How to Cite
MISIKO JACOB, Neymis. Review of Various Encryption Algorithms. Global Journal of Computer Science and Technology, [S.l.], feb. 2019. ISSN 0975-4172. Available at: <https://computerresearch.org/index.php/computer/article/view/1791>. Date accessed: 09 dec. 2019.