Affiliation:
1. Global Institute of Management and Technology, Krishnanagar, India
Abstract
Ensuring the secrecy, integrity, and authenticity of data shared is crucial in an era where digital communication serves as the foundation for global connectedness. In-depth discussions of data encryption and secure communication protocols are provided in this chapter, along with an explanation of how they contribute to the strengthening of the digital environment. Sophisticated encryption standards that use intricate mathematical processes to protect sensitive data include RSA and AES. Data confidentiality is ensured during internet transmission by protocols such as SSL/TLS, which create encrypted connections. Additionally, data is protected from interception and eavesdropping via secure tunnels built by VPN protocols, maintaining anonymity and privacy. The need of secure communication protocols and data encryption in maintaining the integrity of digital interactions is emphasized in this chapter. In an increasingly linked world, people and organizations can strengthen their communication channels against hostile attacks by utilizing strong protocols and cryptographic techniques.
Reference11 articles.
1. BarrettD. J.SilvermanR. E. (2001). SSH, the Secure Shell: the definitive guide. O'Reilly Media, Inc.
2. Data protection in digital learning space: An overview
3. Hyper Text Transfer Protocol for Securing Packet Inspection in Intrusion Prevention System Device
4. Data Encryption in Cloud Storage.;S. R.Gudimetla;International Research Journal of Modernization in Engineering Technology and Science,2024
5. Authenticated Encryption Schemes: A Systematic Review