Review : Methods of Cryptography

Authors

  • Saja Jumaa College of Computer Sciences and Mathmatics ,Tikrit University, Tikrit
  • Dr.Qusay Abboodi Ali College of administration and economics , Tikrit University , Head of Technical , Tikrit
  • Dr. Mshari A. Alshmmri College of Computer Science and Mathmatics , Tikrit University , Tikrit , Iraq

DOI:

https://doi.org/10.55145/ajest.2022.01.02.006

Keywords:

Security, Cryptography Methods, Data

Abstract

In order to safeguard the information and data that must be protected from any interference or incursion, security is one of the most significant and prominent concepts at the moment. There are several techniques to ensure security and the protection of our data, but cryptography is the most crucial. Because of the importance of the documents and information that institutions must deal with or transport over the Internet, where unauthorized users or hackers can read and manipulate them, these documents must be encrypted using cipher methods and techniques.

Downloads

Published

2022-07-29

How to Cite

Jumaa, S., Ali , D. A. ., & Alshmmri , D. M. A. (2022). Review : Methods of Cryptography. Al-Salam Journal for Engineering and Technology, 1(2), 30–34. https://doi.org/10.55145/ajest.2022.01.02.006

Issue

Section

Articles