Proceedings of the 30th iSTEAMS Multidisciplinary &Amp; Inter-Tertiary Research Conference 2022
DOI: 10.22624/aims/isteams/lasustech2022v30p7
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Encryption Methods for Secure Data Communication

Abstract: We are living in the new era of information, and information is an important aspect of our living. So, the need of security is to ensure that our information remains confidential and only authorized users can access it, and ensuring that no unauthorized user has changed our information, so that it provides full accuracy and efficiency. To be secured, information needs to be hidden from unauthorized access i.e. confidentiality and protected from unauthorized change and also available to an authorized entity whe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…These systems are the most popular and frequently utilized in encryption due to a number of crucial features, such as: (no errors in the event of occurrence, simplicity of usage in real applications, implementation speed. As a safe method of keeping information, stream cipher is one of the most significant relatively modern encryption techniques used in communication and storage systems [6]. No encryption technique is impenetrable by those who are determined to get inside.…”
Section: Introductionmentioning
confidence: 99%
“…These systems are the most popular and frequently utilized in encryption due to a number of crucial features, such as: (no errors in the event of occurrence, simplicity of usage in real applications, implementation speed. As a safe method of keeping information, stream cipher is one of the most significant relatively modern encryption techniques used in communication and storage systems [6]. No encryption technique is impenetrable by those who are determined to get inside.…”
Section: Introductionmentioning
confidence: 99%