Please use this identifier to cite or link to this item:
Title: Encryption techniques: A theoretical overview and future proposals
Authors: Arias Tapia, S.
Gomez Alvarado, H.
Correa Quezada, R. 2017-06-16T22:02:25Z
Issue Date: 2016-04-27
Publisher: IEEE Xplore
Abstract: The usage of encrypted messages has a long history. Today, however, we are able to maintain the security and privacy of information, which is essential to current research in encryption. Encrypted information also forms a key part of scientific projects that involve human behavior, bank transactions, and economic, political and social phenomena. In this paper, we provide a theoretical overview of various encryption techniques, namely those that range from changes in the position of a letter or word, to word transformations and transposition. It may also include computer algorithms that have binary functions, which produce coding of a message. Thirdly, it encapsulates the latest advances in science, which are used to obtain the maximum objective of an encrypted message, i.e. the secret-coded message. For the latter, algorithms are used to determine quantum calculations. For this study, the concepts and processes that are discussed are based on algorithms. These not only provide security when sending messages, but also security for passwords that are used to decipher and to encrypt. The conclusions in this study examine the current theoretical framework, and propose the usage of methods to prevent online security breaches. These methods are presented in the proposal. Here we also argue that it is possible to achieve a mixture of cryptography algorithms that foster an improved performance and enhance the speed of safe transactions.
metadata.dc.identifier.other: 10.1109/ICEDEG.2016.7461697
ISSN: 978-3-9075-8911-3
Other Identifiers: 10.1109/ICEDEG.2016.7461697
Other Identifiers: 10.1109/ICEDEG.2016.7461697
metadata.dc.language: Inglés
metadata.dc.type: Article
Appears in Collections:Artículos de revistas Científicas

Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.