ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ENCRYPTION ALGORITHMS WITH EMPHASIS ON PROBABILISTIC ENCRYPTION & TIME STAMP IN NETWORK SECURITY

Journal: IMPACT : International Journal of Research in Engineering & Technology ( IMPACT : IJRET ) (Vol.3, No. 5)

Publication Date:

Authors : ; ;

Page : 39-46

Keywords : Block Ciphers; Des Algorithm; Numerical Model for Data Development;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Encryption is the process of converting a plain text message in to cipher text which can be decoded back in to the original message. An encryption algorithm along with a key is used in the encryption and decryption of data. There are several types of data encryption which form the basis of network security. Encryption schemes are based on block or stream cipher. The type of the length of the keys utilized depend upon the encryption algorithm and the amount of security needed. In Conventional symmetric encryption a single key is used. With this key the sender can encrypt a message and a recipient can decrypt the message but the security of the key becomes problematic. In asymmetric encryption, the encryption key and decryption key are different. ONE is a public key by which the sender can encrypt the message and the other is a private key by which the recipient can decrypt the message

Last modified: 2015-06-20 18:15:19