INTRODUCING A NEW CRYPTOGRAPHIC SCHEME: AK CIPHER
Journal: BEST : International Journal of Management, Information Technology and Engineering ( BEST : IJMITE ) (Vol.3, No. 9)Publication Date: 2015-09-30
Authors : ABHISHEK DADHWAL; KOMAL RAJPAL;
Page : 95-100
Keywords : Integrity; Security;
Abstract
Disclosure of information or leakage of data in an untrusted environment may lead to unauthenticated access to the confidential information and systems security. Whenever a message is transmitted by a sender to a receiver, it means to have a complete protection from ground to up so that no attacker may gain any access to private information. The information exchange, now a days, underlie most modern security protocols. Many schemes have been applied since the security has been considered as the key agreement. [1]For instance-sending sensitive information like social security, passport or credit card numbers, via email is necessary, at such points encrypted message sending is considered. A key is, therefore, provided for encryption process of the sender’s message and encrypted message is then decrypted at the receiver’s side. In this way a secure message is transferred. Formalisation of a proposed technique, AK Cipher, combines two strong techniques and guarantees two times safer sending and receiving which has been shown practically.
Different security channels and tools have been provided to prevent unauthorized access for the exchange of data between two parties. Thus, granting information secrecy and authenticated access. Nevertheless, proposed technique improves encryption security.
Other Latest Articles
- AN APPROACH TO THE PROBLEM SOLVING OF SENSITIVITY DETERMINING OF ELECTRONIC CIRCUITRY
- ELECTRON MICROSCOPY CHARACTERIZATION OF INDIVIDUAL AEROSOL PARTICLES
- Conceptualizing Conviviality in Urban Landscapes
- Places as Assemblages: Paradigm Shift or Fashionable Nonsense?
- Madrid versus Barcelona: Two Visions for the Modern City and Block (1929-36)
Last modified: 2015-10-03 19:52:55