Research on Various Cryptography Techniques
Author(s) -
Yahia Alemami,
Mohamad Afendee,
Saleh Atiewi
Publication year - 2019
Publication title -
international journal of recent technology and engineering (ijrte)
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.b1069.0782s319
Subject(s) - encryption , computer science , secrecy , cryptography , computer security , strong cryptography , power consumption , power (physics) , physics , quantum mechanics
Security plays a critical position in preserving information privacy and secrecy. Many encryption strategies are available to protect data during transmission or storage. These encryption methods vary in terms of strength, speed, and resource consumption (CPU usage, memory, and power). This study aims to present the most popular and interesting algorithms currently in use
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom