Abstract:
The goal of this study is to provide a thorough overview of encryption in information security. The method of protecting data is referred to as cryptography. Network secu...Show MoreMetadata
Abstract:
The goal of this study is to provide a thorough overview of encryption in information security. The method of protecting data is referred to as cryptography. Network security, on either hand, is indeed the act of maintaining data private, secret, and safe from unwanted and unlawful access. To safeguard information stored in our systems and data exchanged over wireless networks, our services use encryption communication and network security. Because the use of computing and data networking is rising, security is becoming a more sensible and vital concern in today's world. Banking, commerce, government agencies, organizations', the army, spy agencies, enterprises, businesses, and people's daily lives all employ encryption and network security in some way. Cryptography employs a variety of algorithms and approaches to secure networks and data. We covered a variety of encryption / decryption techniques, as well as cryptography theories, cryptosystem types, and a cryptographic model and algorithm. Reliability, confidentially, identification, validity, - anti, and access control are the six major security services. Interception, disruption, illegal access, and modification are all security dangers to our information.
Published in: 2022 International Conference on Cyber Resilience (ICCR)
Date of Conference: 06-07 October 2022
Date Added to IEEE Xplore: 03 January 2023
ISBN Information: