Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 11, November 2017
A Survey on Encryption Techniques
Mahendra Kumar Sahu, Mohd. Shajid Ansari
Cryptography play an important role in secure communication and it offer an admirable solution to compromise the necessary protection against the data intruders. As the use digital techniques for communicating, it becomes a key issue that how to keep the confidentiality, integrity and authenticity of data. There are various techniques, which discovered from time to time to encrypt the data to make it more secure.
Keywords: Cryptography, cipher, encryption, decryption, symmetric key, asymmetric key
Edition: Volume 6 Issue 11, November 2017
Pages: 1186 - 1189
How to Cite this Article?
Mahendra Kumar Sahu, Mohd. Shajid Ansari, "A Survey on Encryption Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20178223, Volume 6 Issue 11, November 2017, 1186 - 1189
103 PDF Views | 97 PDF Downloads
Similar Articles with Keyword 'Cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Similar Articles with Keyword 'cipher'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1232 - 1234A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem
Rashmi Khawale, Omprakash Tembhurne
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2523 - 2525Study of Semantic Retrieval by Data Similarity of Trademarks
Deepak Mali, P. D. Lambate
Similar Articles with Keyword 'encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Similar Articles with Keyword 'decryption'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran
Similar Articles with Keyword 'symmetric key'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2545 - 2549Implementation of Random Grid Visual Cryptography for Color Images
Snehal N. Meshram, Sneha U. Bohra
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 2084 - 2088Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission
Shital Gawahale, Rekha Jadhav
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1728 - 1731Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2225 - 2229A Novel Real Time Offline Patching Scheme with Secured Logging Over Cloud
Sunita, Shridevi Soma
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2447 - 2449Enhanced Security Providing using Visual Cryptography
Ketan Raju Kundiya, Ram B. Joshi
Similar Articles with Keyword 'asymmetric key'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1728 - 1731Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 968 - 972Fuzzy Based Fully Homomorphic Encryption Scheme for Security in Cloud Computing
Navjeet Singh, Rimple Ahuja
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016
Pages: 1420 - 1422AHCS (Advanced Hybrid Cryptographic System)
Mohit Prakash
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1925 - 1928A Survey on Asymmetric Key Aggregate Encryption in Data Sharing
Shilpashree P, Dr. K. N. Narasimha Murthy
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1186 - 1189A Survey on Encryption Techniques
Mahendra Kumar Sahu, Mohd. Shajid Ansari