Department of computer science corporate with The Cybercity for information assurance.
Encryption Shifting
The Abstarct
The encryption method is used to convert information into encrypted form so that
only authorized individuals can read it. Encryption is used to protect data from prying
eyes during storage or transmission over insecure and secure communication
channels. Asymmetric encryption and symmetric encryption are produced depending
on the use of encryption keys. With symmetric encryption, only one key is required
for encryption and decryption (the same key for the sender and recipient), and the
key should be kept secret. When outsiders know the asymmetric encryption
algorithm and public key, but the recipient only knows the private key
Keywords: cryptography, encryption, asymmetric encryption, symmetric encryption.
Encryption is the process of encoding messages or information so that only
authorized individuals can access it. Encryption cannot interfere, but it does prevent
an unauthorized person from accessing the original data. The purported information
or message is plaintext in an encryption scheme, it is encrypted using an encryption
algorithm, and the encrypted texts can only be read after decryption. The primary
function of encryption is to maintain the confidentiality of the information transmitted
in communications. For use with any encryption algorithm. The use of an encryption
key, which validates the selection of a specific conversion variant from a set of
possible ones for a given algorithm, is an important feature. In theory, it is possible to
decrypt a message without a key, but it requires a very powerful computer, a lot of
time, and the expertise of a professional if the encryption is designed with a good
encryption scheme. A message can be easily decrypted by an authorized recipient
using an authentic key provided by the sender to the recipients.
ENCRYPTION SHIFTING 1