Intruder Proof and Secure Cryptography?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 6)Publication Date: 2014-06-30
Authors : Ravinder Sangwan; Anshul Anand;
Page : 28-33
Keywords : Encryption; Cryptanalyst; Decryption; Intruder; Public key; Private Key;
Abstract
Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is a science of protecting information by encoding it into an unreadable format. Although the ultimate goal of cryptography, and the mechanisms that make it up, is to hide information from unauthorized individuals, most algorithms can be broken and the information can be revealed if the attacker has enough time, desire, and resources. This paper presents the way of protecting the information from: ? Intruders: those who capture the packet and alter the information. ? Cryptanalysts: those who decrypt cipher text into plain text without key.
Other Latest Articles
- Ranked Keyword Search in Cloud Computing: An Innovative Approach?
- An Effective Approach on Scheduling Algorithm in Cloud Computing?
- An Efficient Behavior Trust EvaluationSystem for Wireless Sensor Networks.
- A Competitive Assessment on Fly-Ash Bricks and Clay Bricks in Central Gujarat Region of India Using Chi-Square Test(χ2) through SPSS Software.
- Effective Analysis on Remote to User (R2L) Attacks Using Random Forest Algorithm
Last modified: 2014-06-05 15:20:01