This
paper proposes a new system JDCE, where compression is
provided to the data twice before encrypted it for getting it
ready for transmission.
Tag: cryptography
A New Image Encryption Algorithm Based Slicing and Displacement Followed By Symmetric and Asymmetric Cryptography Technique
The Proposed Architecture for encryption and decryption of an image using suitable user-defined key is developed. The cipher image
generated by this method can be very in size as the original image due to image scaling to make 128 bits block at a time and is suitable for
practical use in the secure transmission of confidential information over the Internet.

Data Security Using Private Key Encryption System Based on Arithmetic Coding
Data Security Using Private Key Encryption System Based on Arithmetic Coding -The problem faced by today’s communicators is not only security but also the speed of communication and size of content. In the present paper, a scheme has been proposed which uses the concept of compression and data encryption
Continue reading
Overview of Cryptography Cybersecurity, Data Privacy & eDiscovery Law & Policy eJournal
The widespread use of cryptography is a necessary consequence of the information revolution. With the coming of electronic communications on computer networks, people need a way to ensure that conversations and transactions remain confidential. Cryptography provides a solution to this problem, but it has spawned a heated policy debate. Some government agencies want to restrict the use of data encryption because they fear that criminals and spies may use the technology to their own advantage. However, Encryption Techniques so far have both advantages and disadvantages to society, and issues about abuse require a formularized policy.
Continue readingOverview of Cryptography by Onwutalobi Anthony-Claret
The widespread use of cryptography is a necessary consequence of the information revolution. With the coming of electronic communications on computer networks, people need a way to ensure that conversations and transactions remain confidential. Cryptography provides a solution to this problem, but it has spawned a heated policy debate. Some government agencies want to restrict the use of data encryption because they fear that criminals and spies may use the technology to their own advantage. However, Encryption Techniques so far has both advantages and disadvantages to the society and issues about abuse required a formularized policy.
Continue reading