A New Image Encryption Algorithm Based Slicing and Displacement Followed By Symmetric and Asymmetric Cryptography Technique

The Proposed Architecture for encryption and decryption of an image using suitable user-defined key is developed. The cipher image
generated by this method can be very in size as the original image due to image scaling to make 128 bits block at a time and is suitable for
practical use in the secure transmission of confidential information over the Internet.

Continue reading

Overview of Cryptography Cybersecurity, Data Privacy & eDiscovery Law & Policy eJournal

The widespread use of cryptography is a necessary consequence of the information revolution. With the coming of electronic communications on computer networks, people need a way to ensure that conversations and transactions remain confidential. Cryptography provides a solution to this problem, but it has spawned a heated policy debate. Some government agencies want to restrict the use of data encryption because they fear that criminals and spies may use the technology to their own advantage. However, Encryption Techniques so far have both advantages and disadvantages to society, and issues about abuse require a formularized policy.

Continue reading

Overview of Cryptography by Onwutalobi Anthony-Claret

The widespread use of cryptography is a necessary consequence of the information revolution. With the coming of electronic communications on computer networks, people need a way to ensure that conversations and transactions remain confidential. Cryptography provides a solution to this problem, but it has spawned a heated policy debate. Some government agencies want to restrict the use of data encryption because they fear that criminals and spies may use the technology to their own advantage. However, Encryption Techniques so far has both advantages and disadvantages to the society and issues about abuse required a formularized policy.

Continue reading