ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

INTRODUCING A NEW CRYPTOGRAPHIC SCHEME: AK CIPHER

Journal: BEST : International Journal of Management, Information Technology and Engineering ( BEST : IJMITE ) (Vol.3, No. 9)

Publication Date:

Authors : ; ;

Page : 95-100

Keywords : Integrity; Security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Disclosure of information or leakage of data in an untrusted environment may lead to unauthenticated access to the confidential information and systems security. Whenever a message is transmitted by a sender to a receiver, it means to have a complete protection from ground to up so that no attacker may gain any access to private information. The information exchange, now a days, underlie most modern security protocols. Many schemes have been applied since the security has been considered as the key agreement. [1]For instance-sending sensitive information like social security, passport or credit card numbers, via email is necessary, at such points encrypted message sending is considered. A key is, therefore, provided for encryption process of the sender’s message and encrypted message is then decrypted at the receiver’s side. In this way a secure message is transferred. Formalisation of a proposed technique, AK Cipher, combines two strong techniques and guarantees two times safer sending and receiving which has been shown practically. Different security channels and tools have been provided to prevent unauthorized access for the exchange of data between two parties. Thus, granting information secrecy and authenticated access. Nevertheless, proposed technique improves encryption security.

Last modified: 2015-10-03 19:52:55