News Updates Thursday 26th Dec 2024 :
  • Welcome to INPRESSCO, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission is open. Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in NAAS, University of Regensburg Germany, Google Scholar, Cross Ref etc.
  • DOI is given to all articles

Cryptography


Author : Ritika

Pages : 1496-1498
Download PDF
Abstract

We are living in a world where majority of business is done online, which raises questions over security of the data. Cryptography secures the data from originating point to end point. Cryptography protects your data by way of encrypting before reaching to end user where you can decrypt the data by using various techniques in this way cryptography protects your data from unknown/suspicious sources for this purpose various techniques can be used like private key encryption, public key encryption or combination of both.

Keywords: Encrypt, decrypt, cryptography

Article published in International Journal of Current Engineering and Technology, Vol.7, No.4 (Aug-2017)

Call for Papers
  1. IJCET- Current Issue
  2. Issues are published in Feb, April, June, Aug, Oct and Dec
  3. DOI is given to all articles
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2023 INPRESSCO® All Rights Reserved