Please use this identifier to cite or link to this item:
|Title:||Encryption techniques: A theoretical overview and future proposals|
|Authors:||Arias Tapia, S.|
Gomez Alvarado, H.
Correa Quezada, R.
|Abstract:||The usage of encrypted messages has a long history. Today, however, we are able to maintain the security and privacy of information, which is essential to current research in encryption. Encrypted information also forms a key part of scientific projects that involve human behavior, bank transactions, and economic, political and social phenomena. In this paper, we provide a theoretical overview of various encryption techniques, namely those that range from changes in the position of a letter or word, to word transformations and transposition. It may also include computer algorithms that have binary functions, which produce coding of a message. Thirdly, it encapsulates the latest advances in science, which are used to obtain the maximum objective of an encrypted message, i.e. the secret-coded message. For the latter, algorithms are used to determine quantum calculations. For this study, the concepts and processes that are discussed are based on algorithms. These not only provide security when sending messages, but also security for passwords that are used to decipher and to encrypt. The conclusions in this study examine the current theoretical framework, and propose the usage of methods to prevent online security breaches. These methods are presented in the proposal. Here we also argue that it is possible to achieve a mixture of cryptography algorithms that foster an improved performance and enhance the speed of safe transactions.|
|Appears in Collections:||Artículos de revistas Científicas|
Files in This Item:
There are no files associated with this item.
This item is protected by original copyright
Los recursos publicados en el RiUTPL se distribuyen bajo la licencia: