Information security is the process that protects its availability, privacy, and integrity. Access to stored information on computer databases has increased nowadays. Most companies store business and individual information in computer. Much of the information stored is highly confidential and not for knowing publicly. Data encryption is most traditional technique that secure highly confidential information by using some conventional algorithm, which already exist or prewritten. Most powerful part of encryption technique is key generation, which has two parts, one is symmetric key generation and another is asymmetric key generation. Nowadays hackers are easily capable to break the key with the help of modern high computing machines. Current need is strongly encrypted data which cannot be decrypt through cryptanalysis. Paper presented discusses some traditional as well as modern hybrid encryption techniques along with quantum approach such as RSA based on ECC with AVK, DES-RSA, RSA-based singular cubic curve, JCE, 3D chaotic map technique, Blowfish.
CITATION STYLE
Dixit, P., Gupta, A. K., Trivedi, M. C., & Yadav, V. K. (2018). Traditional and hybrid encryption techniques: A survey. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 4, pp. 239–248). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-10-4600-1_22
Mendeley helps you to discover research relevant for your work.