Efficient Cryptographic Encryption Techniques for Data Privacy Preservation
Mangore Anirudh K1, M Roberts Masillamani2
1Mangore Anirudh K, Department of Computer science and Engineering, Bharath Institute of Higher Education and Research, Chennai, India.
2M Roberts Masillamani, Department of Computer science and Engineering, Bharath Institute of Higher Education and Research, Chennai, India.
Manuscript received on 04 May 2019 | Revised Manuscript received on 09 May 2019 | Manuscript Published on 13 May 2019 | PP: 365-367 | Volume-8 Issue-7S May 2019 | Retrieval Number: G10650587S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In present digital era, a remarkable development in the networking technology leads a process of interchanging of the digital information very often. The information in both the private ownership and public sectors are increased which needs Availability Authentication, Confidentiality, Integrity. The security of the confidential information from the unauthorized access can be done by numerous file encryption strategies. Security is the significant issue, when the delicate data is saved and moved throughout the web where the data is no longer secured by physical limits. Cryptography is an important, reliable and effective element to make sure the protected interaction between the various entities by moving muddled data and also only the authorized concern person can be able to retrieve the data. The security of communication is an essential concern on World Wide Web. It has to do with privacy, integrity, authentication throughout the access or modifying of secret internal credentials. This article will focus a few of the most fascinating algorithms of file encryption that are presently utilized. This paper emphasis primarily on existing various sort of file encryption strategies.
Keywords: This Article will Focus a Few of the Most Fascinating Algorithms of file Encryption that are Presently Utilized.
Scope of the Article: Computer Science and Its Applications