Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

The Study of Secure Communication using Cryptography Algorithms

View through CrossRef
Network and internet applications are growing in popularity daily. Security and safety procedures are needed for sensitive information. By transforming data from its original form into an unreadable one, encryption algorithms offer the required defence against attacks by data intruders. Now a days, username/password authentication makes up the majority of web authentication. Data security can be achieved via a method known as cryptography. In the past, military data was kept secure using cryptography to safeguard national security. After the advent of communication tools, the range of uses for cryptography has significantly increased today; cryptography is primarily necessary to ensure that data are safeguarded against penetrations and to prevent the practise of spying. The state of the art for several different cryptographic methods used in networking applications is discussed in this paper with help of examples.
Title: The Study of Secure Communication using Cryptography Algorithms
Description:
Network and internet applications are growing in popularity daily.
Security and safety procedures are needed for sensitive information.
By transforming data from its original form into an unreadable one, encryption algorithms offer the required defence against attacks by data intruders.
Now a days, username/password authentication makes up the majority of web authentication.
Data security can be achieved via a method known as cryptography.
In the past, military data was kept secure using cryptography to safeguard national security.
After the advent of communication tools, the range of uses for cryptography has significantly increased today; cryptography is primarily necessary to ensure that data are safeguarded against penetrations and to prevent the practise of spying.
The state of the art for several different cryptographic methods used in networking applications is discussed in this paper with help of examples.

Related Results

A Survey about Post Quantum Cryptography Methods
A Survey about Post Quantum Cryptography Methods
Cryptography is an art of hiding the significant data or information with some other codes. It is a practice and study of securing information and communication. Thus, cryptography...
A Research Paper on Cryptography
A Research Paper on Cryptography
Cryptography is a fundamental aspect of modern information security, encompassing techniques for securing communication and data privacy. This abstract provides an overview of cryp...
Quantum Cryptography: Advancements, Challenges, and Applications in Modern Communication
Quantum Cryptography: Advancements, Challenges, and Applications in Modern Communication
This research paper explores the fascinating field of Quantum Cryptography, a cutting-edge technology that leverages principles of quantum mechanics to secure information transfer....
Communication Management
Communication Management
The question of what comprises communication management has caused numerous discussions among communication scholars representing different theoretical and disciplinary angles. Com...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
Environmental Communication
Environmental Communication
The study of environmental communication, as a subfield of the study of communication, is a relatively recent endeavor. Roughly speaking, the field of environmental communication i...
Quantum Communication and Cybersecurity
Quantum Communication and Cybersecurity
Abstract: This book presents a comprehensive and interdisciplinary examination of the convergence between quantum information science and cybersecurity. It addresses the foundation...

Back to Top