
A Review of Encryption Methods for Secure Data Communication
Author(s) -
Jerry Abayomi Sarumi
Publication year - 2022
Language(s) - English
Resource type - Conference proceedings
DOI - 10.22624/aims/isteams/lasustech2022v30p7
Subject(s) - computer security , computer science , encryption , cryptography , confidentiality , key (lock) , information security , public key cryptography , attribute based encryption , internet privacy
We are living in the new era of information, and information is an important aspect of our living. So, the need of security is to ensure that our information remains confidential and only authorized users can access it, and ensuring that no unauthorized user has changed our information, so that it provides full accuracy and efficiency. To be secured, information needs to be hidden from unauthorized access i.e. confidentiality and protected from unauthorized change and also available to an authorized entity when it is needed. Cryptography is a technique that can be employed to ensure the security of transmitted information. This papers reviews existing tecgniques for cryptography and identified salient attributes of each method. Keywords: Cryptography; Symmetric key; ciphered text; Public Key; Private Key; Encryption;Decryption, Security, Transmission, Cyber Security.