News Updates Thursday 13th Dec 2018 :
  • Welcome to INPRESSCO, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission last date of Nov/Dec 2018 extended to 15 Dec 2018, Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in NAAS, University of Regensburg Germany, Google Scholar, Cross Ref etc.
  • DOI is given to all articles

Cryptography


Author : Ritika

Pages : 1496-1498
Download PDF
Abstract

We are living in a world where majority of business is done online, which raises questions over security of the data. Cryptography secures the data from originating point to end point. Cryptography protects your data by way of encrypting before reaching to end user where you can decrypt the data by using various techniques in this way cryptography protects your data from unknown/suspicious sources for this purpose various techniques can be used like private key encryption, public key encryption or combination of both.

Keywords: Encrypt, decrypt, cryptography

Article published in International Journal of Current Engineering and Technology, Vol.7, No.4 (Aug-2017)

Call for Papers
  1. IJCET- Nov/Dec 2018 Issue

    Submission Last Date
    15 Dec
  2. DOI is given to all articles
  3. Current Issue
  4. IJTT-Dec-2018
  5. IJAIE-Dec-2018
  6. IJCSB-Dec-2018
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2018 INPRESSCO® All Rights Reserved