A review and analysis on text data encryption techniques

S Kumar, K Patidar, R Kushwah… - International Journal of …, 2017 - search.proquest.com
In the current age there is need of data security in every field. This paper deals with text data
security. In this area there are several research works have already been done and some in …

A Review of Text Encryption Techniques

H Agrawal, M Sharma - Asian Journal of Computer …, 2014 - informaciontechnologica.com
In the today world, security is required to transmit confidential information over the network.
Security is also demanding in wide range of applications. Cryptographic algorithms play a …

[PDF][PDF] Survey paper: Cryptography the art of hiding information

MK Pandey, D Dubey - … Journal of Advanced Research in Computer …, 2013 - academia.edu
Data security is one of the important aspects of data communication. The confidential data
being sent via electrical media is very sensitive, which can be accessed for malicious …

[PDF][PDF] Analysis of various cryptography techniques: a survey

N Tayal, R Bansal, S Gupta, S Dhall - International Journal of …, 2016 - academia.edu
Maintaining the confidentiality of data during communication has always been a prime
concern of many researchers. Several encryption mechanisms have been developed in …

[PDF][PDF] A new algorithm for encrypting Arabic text using the mathematical equation

B Najim al-din, SA Shaban - Diyala journal of engineering sciences, 2017 - iasj.net
Most organizations today use two levels of security: Data security level (encryption) and
Network security level (firewall) etc. Therefore, encryption plays a vital role in securing daily …

[PDF][PDF] Text encryption using modified AES-2 keys

ZK Taha - International Journal of Computer Applications, 2016 - researchgate.net
Data security is an essential component of an organization in order to keep the information
safe from various competitors. This project includes the complete step by step …

A Novel Approach of Text Encryption Using Random Numbers and Hash Table

AK Das, N Kar - Advances in Cyber Security: Second International …, 2021 - Springer
In modern days, word files are used to carry out information storage and other multiple
operations. The word file allows the users to write valuable text and information in plain text …

An efficient hybrid encryption technique based on DES and RSA for textual data

S Chourasia, KN Singh - … and Intelligent Applications: Proceedings of Third …, 2016 - Springer
The data security in almost every field is a challenging concern all around the globe. The
application area may be as wide in the area of banking, internet, network and mobile data …

Data Encryption Using Different Techniques: A Review.

M Kaur, J Kaur - … Journal of Advanced Research in Computer …, 2017 - search.ebscohost.com
In present times, the high growth in the networking technology leads a practice of
interchanging of the digital data very frequently. The data in both the private and public …

[PDF][PDF] Data security using various cryptography Techniques: A Recent Survey

RM Pandey, VK Verma - … for Research in Engineering Application & …, 2015 - academia.edu
Today internet is widely used tool for communication, exchange of information and sending
and receiving of data using computers, mobile phones and other electronic gadgets …