📞 +91-7667918914 | ✉️ iarjset@gmail.com
International Advanced Research Journal in Science, Engineering and Technology
International Advanced Research Journal in Science, Engineering and Technology A Monthly Peer-Reviewed Multidisciplinary Journal
ISSN Online 2393-8021ISSN Print 2394-1588Since 2014
IARJSET aligns to the suggestive parameters by the latest University Grants Commission (UGC) for peer-reviewed journals, committed to promoting research excellence, ethical publishing practices, and a global scholarly impact.
← Back to VOLUME 9, ISSUE 6, JUNE 2022

Security Aspects of Different Technologies Intended for Different Techniques

Arpita B, A G Vishvanath

👁 1 view📥 0 downloads
Share: 𝕏 f in

Abstract: Cybersecurity and Cryptography are the current era for giving the safety for personal facts, Security and Privacy are essential elements. The foremost motive of this paper is to fashion and put in force excessive protection machine. Security can be a high challenge in our every day life. Perhaps the most crucial utility of correct non-public identity is securing confined get admission to structures from malicious attacks. Access machine paperwork, a vast hyperlink in a total protection chain. This technology listen approximately protection, privacy, facts, integrity and authentication. Authentication is to allow get admission to manage best for legal quit customers performs a crucial function in carrier company reliability, confidence, and records protection, etc. User authentication is a crucial protection process. Encryption is the crucial element in cryptography, we use AES (Advanced Encryption Standard) & DES (Data Encryption Standard) Algorithms that is used to provide the safety for information. We permit ourselves to growth the overall performance of this set of rules through minimizing the time required for the cryptographic process. Security structures are the pressure of the day, which facilitates to keep away from robbery and avoids unauthorized access of peoples into constrained area.

Keywords: Cybersecurity, Cryptography, Single Sign On, Encryption, AES, DES.

How to Cite:

[1] Arpita B, A G Vishvanath, “Security Aspects of Different Technologies Intended for Different Techniques,” International Advanced Research Journal in Science, Engineering and Technology (IARJSET), DOI: 10.17148/IARJSET.2022.9668

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.