Abstract

Abstract: Evolution and modernization have brought about progress in technology and this has led to the reduction in privacy & internet security due to an increase in cybercrime and threats. As a result of this turn of events, Cryptography is now being used as a means of keeping information of any kind safe from third party individual(s). Research has shown that with the Encryption of information, third party individual(s) have no chance or less chance of getting past this security measure. Hence, Cryptographers keep improving algorithms to make it impossible for a third party to decrypt this information without the key which is where database Privacy and Security come in. The database contains all the information which is a major asset, there are encryptions which can be used at different levels to provide security. Lastly, for encryption algorithms which are breached by unknown third-party individual(s), the zero knowledge of proof helps to figure out the identity of this individual. They are an extremely interesting and useful construct. They are fascinating because of their definition, which is mutually opposed, their applicability is very vast in cryptography; they are used to restrict the malevolent users to work according to the protocol. Zero-knowledge serve as a good medium to understand the problems regarding cryptographic protocols. Keywords: Cipher, Encryption, Decryption, Key, Security, Database, Zero-Knowledge

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call