Abstract: Encryption is the most effective way to achieve data security. It is the process in which plain text converts into a cipher text and allows only authorized people to access the sender information. In this research paper I would like to explain different types of encryption techniques such as hashing function and symmetric and asymmetric methods with advantages and disadvantages including necessary practical examples.
Keywords: Encryption, Cryptography, Hashing, Asymmetric, Symmetric, Cipher text
Title: Encryption
Author: Sruthi Medasani, Professor Tarik El Taeib,
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals