Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{146450,
author = {Priyamvada Saxena},
title = {Theoretical Overview of various Encryption Techniques on Data Security},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {4},
number = {12},
pages = {677-681},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=146450},
abstract = {Data Security is an important element in data communication. Numerous encryption techniques play a key role in securing the data. The techniques strengthen data privacy by making it unreadable or impossible to break the data which can be understandable. By using the techniques discussed in the paper security can be provided against eavesdropping. The techniques that protects data is called cryptography which converts a plain-text into incomprehensible form and the back process produces data in lucid form. The above process is defined as encryption of data and decryption of data. This paper discusses various encryption techniques that can be used for data security.
},
keywords = {Encryption, Decryption, Public-key encryption, Private-key encryption, plain-text, cipher-text Introduction (Heading 1)},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry