Research on Various Cryptography Techniques
Yahia Alemami1, Mohamad Afendee Mohamed2, Saleh Atiewi3

1Yahia Alemami, Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin, Terengganu, Malaysia.
2Mohamad Afendee Mohamed, Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin, Terengganu, Malaysia.
3Saleh Atiewi, Department of Computer Science, Al Hussein Bin Talal University College of IT, Ma’an, Jordan.
Manuscript received on 18 July 2019 | Revised Manuscript received on 03 August 2019 | Manuscript Published on 10 August 2019 | PP: 395-405 | Volume-8 Issue-2S3 July 2019 | Retrieval Number: B10690782S319/2019©BEIESP | DOI: 10.35940/ijrte.B1069.0782S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Security plays a critical position in preserving information privacy and secrecy. Many encryption strategies are available to protect data during transmission or storage. These encryption methods vary in terms of strength, speed, and resource consumption (CPU usage, memory, and power). This study aims to present the most popular and interesting algorithms currently in use.
Keywords: Cryptography, Data Security, Public Key, Resource Consumption, Secret Key.
Scope of the Article: Big Data Security