Network security: Evolving encryption, compression techniques