ENCRYPTION ALGORITHMS WITH EMPHASIS ON PROBABILISTIC ENCRYPTION & TIME STAMP IN NETWORK SECURITY
Journal: IMPACT : International Journal of Research in Engineering & Technology ( IMPACT : IJRET ) (Vol.3, No. 5)Publication Date: 2015-06-05
Authors : PINKI SINGH; RUCHIR BHATNAGAR;
Page : 39-46
Keywords : Block Ciphers; Des Algorithm; Numerical Model for Data Development;
Abstract
Encryption is the process of converting a plain text message in to cipher text which can be decoded back in to the original message. An encryption algorithm along with a key is used in the encryption and decryption of data. There are several types of data encryption which form the basis of network security. Encryption schemes are based on block or stream cipher.
The type of the length of the keys utilized depend upon the encryption algorithm and the amount of security needed. In Conventional symmetric encryption a single key is used. With this key the sender can encrypt a message and a recipient can decrypt the message but the security of the key becomes problematic. In asymmetric encryption, the encryption key and decryption key are different. ONE is a public key by which the sender can encrypt the message and the other is a private key by which the recipient can decrypt the message
Other Latest Articles
- Differential Responses of Antioxidant Enzymes in Salt-Stressed Almond Tree Grown Under Sun and Shade Conditions
- Comparative morphological and histological study of the pecten oculi in two species of Iraqi birds (Falco tinnunculus L. and Streptopelia decaocto F
- Molecular Markers to Assess the Hybrid Nature of an Improved Mulberry Genotype
- He role of Arbuscular M ycorrhiza in accumulation of Pb and Ni in Panicum miliaceum L. from polluted so
- Effect of Temperature and Plant Growth Regulators on Seed Germination Response of Oroxylum indicum-A High Value Threatened Medicinal Plant of Sikkim Himalaya
Last modified: 2015-06-20 18:15:19