Abstract
Recently, there has been a significant increase in the number of Internet users. Thus, digital data has occupied the highest rank in our time, because most companies and governments adopt the total dependence for the transmission of their data transactions with customers and banking transactions over the World Wide Web. Therefore, total reliance on digital data needs to secure this data and preserve it from theft and modification in order to reach the intended user intact without distortion, and this is done by securing this data using encryption with its various techniques. There are many technologies that encrypt the data sent to the receiving party called encryption techniques. This research will examine the analysis of different encryption techniques, for example, symmetric cryptography technique and asymmetric cryptography techniques, Rivest Shamir and Adleman, Diffie-Hellman, Digital Signature Algorithm, (ECC) Elliptic curve cryptography, and how can employ them and explore the best methods of cryptography techniques that give complete confidential and transmitted data.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.