Please use this identifier to cite or link to this item: http://dspace.utpl.edu.ec/handle/123456789/18818
Full metadata record
DC FieldValueLanguage
dc.contributor.authorArias Tapia, S.es_ES
dc.contributor.authorGomez Alvarado, H.es_ES
dc.contributor.authorCorrea Quezada, R.es_ES
dc.date.accessioned2017-06-16T22:02:25Z-
dc.date.available2017-06-16T22:02:25Z-
dc.date.issued2016-04-27es_ES
dc.identifier10.1109/ICEDEG.2016.7461697es_ES
dc.identifier.issn978-3-9075-8911-3es_ES
dc.identifier.other10.1109/ICEDEG.2016.7461697es_ES
dc.identifier.urihttp://dspace.utpl.edu.ec/handle/123456789/18818-
dc.description.abstractThe usage of encrypted messages has a long history. Today, however, we are able to maintain the security and privacy of information, which is essential to current research in encryption. Encrypted information also forms a key part of scientific projects that involve human behavior, bank transactions, and economic, political and social phenomena. In this paper, we provide a theoretical overview of various encryption techniques, namely those that range from changes in the position of a letter or word, to word transformations and transposition. It may also include computer algorithms that have binary functions, which produce coding of a message. Thirdly, it encapsulates the latest advances in science, which are used to obtain the maximum objective of an encrypted message, i.e. the secret-coded message. For the latter, algorithms are used to determine quantum calculations. For this study, the concepts and processes that are discussed are based on algorithms. These not only provide security when sending messages, but also security for passwords that are used to decipher and to encrypt. The conclusions in this study examine the current theoretical framework, and propose the usage of methods to prevent online security breaches. These methods are presented in the proposal. Here we also argue that it is possible to achieve a mixture of cryptography algorithms that foster an improved performance and enhance the speed of safe transactions.es_ES
dc.languageIngléses_ES
dc.titleEncryption techniques: A theoretical overview and future proposalses_ES
dc.typeArticlees_ES
dc.publisherIEEE Xplorees_ES
Appears in Collections:Artículos de revistas Científicas

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.