Review of Various Encryption Algorithms
Review of Various Encryption Algorithms
Article PDF

Keywords

encryption
algorithms
software’s
behaviors

How to Cite

Neymis Misiko Jacob. (2019). Review of Various Encryption Algorithms. Global Journal of Computer Science and Technology, 19(E1), 1–3. Retrieved from https://gjcst.com/index.php/gjcst/article/view/457

Abstract

Advancement in technology dictates that information security user data integrity and security be paramount to protect user information and data from vulnerabilities from malicious intruders- third parties Need is therefore a factor for information systems to secure user data and information The concept data encryption ensures that user data is unreadable to third parties keeping their information more safe and secure while using the internet A lot information on security has been provided by both the physical security and operating system security but neither of these methods have successfully and sufficiently provided a secure mechanism and support on storing and processing of user data and information This paper reviews the various encryption algorithms that are employed to protect user information and data against various vulnerabilities
Article PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2018 Authors and Global Journals Private Limited