Abstract
Abstract: Evolution and modernization have brought about progress in technology and this has led to the reduction in privacy & internet security due to an increase in cybercrime and threats. As a result of this turn of events, Cryptography is now being used as a means of keeping information of any kind safe from third party individual(s). Research has shown that with the Encryption of information, third party individual(s) have no chance or less chance of getting past this security measure. Hence, Cryptographers keep improving algorithms to make it impossible for a third party to decrypt this information without the key which is where database Privacy and Security come in. The database contains all the information which is a major asset, there are encryptions which can be used at different levels to provide security. Lastly, for encryption algorithms which are breached by unknown third-party individual(s), the zero knowledge of proof helps to figure out the identity of this individual. They are an extremely interesting and useful construct. They are fascinating because of their definition, which is mutually opposed, their applicability is very vast in cryptography; they are used to restrict the malevolent users to work according to the protocol. Zero-knowledge serve as a good medium to understand the problems regarding cryptographic protocols. Keywords: Cipher, Encryption, Decryption, Key, Security, Database, Zero-Knowledge
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal for Research in Applied Science and Engineering Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.