Return to Article Details Architecture of Security Evaluation and Encryption Techniques