SURVEY OF CRYPTOGRAPHY IN NET SECURITY USED IN E-COMMERCE ?A TOOL FOR SAFETY
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.5, No. 3)Publication Date: 2016-03-30
Authors : Aamir Khan; Akanksha Kesari; Aboli Sarode; Arti Dhanotiya; Arti Bansal; Apeksha Suryavanshi;
Page : 917-924
Keywords : KEYWORDS: Encryption; Decryption; Cryptanalysis; key.;
Abstract
Today the use of computers in every one life is a common and easy way to improve day to day life and to lead the community at large to nurture the benefits of modern technologies, but this common path needs security, in its operations. In the early part of 21st Century computer networks were used as a daily tool for a human being for sending e-mails, making online transactions, sharing devices. The art of secret writing is 'CRYPTOGRAPHY’, which enables a secured communication between two people over an insecure channel in such a way that the other opponents in the path cannot harm the communicators .This article throws light on process of sharing the information to a form that will be unintelligible to an unintended person by symmetric and asymmetric cryptography. It helps to understand the creation of basic 'CRYPTOSYSTEM’, and also focus on the difficulties and challenges in use of cryptography in network security ,with a suggested solution on the problem .The sender and recipient may use same key and encryption /decryption algorithm to encrypt /decrypt given data or may use different key in public key cryptography. All secure data transactions including defence, net payment, access control, business and e-commerce apply cryptography in their operations to safeguard their interests. The use of cryptography technique is the reliable modern tool to build a fair system of confidentiality, integrity and control access, availability & authentication of data. The art and science of concealing the message to introduce secrecy in information security is Cryptography. As the cipher text is public and attackers can get the information and in asymmetric cryptography it require more processing power and computational time we present ECC and quantum computational algorithm.
Other Latest Articles
- STUDY PAPER ON EDUCATION USING VIRTUAL REALITY
- STUDY OF SMART CITY USING INTERNET OF THINGS
- STUDY OF EFFICIENT MALL BILLING SYSTEM USING TECHNOLOGIES LIKE NEAR FIELD COMMUNICATION & ELECTRONIC DATA CAPTURE
- STUDY OF DIFFERENT MOBILE APPLICATIONS
- IMPLEMENTATION OF FACE RECOGNITION SYSTEM BASED ON ELASTIC BUNCH GRAPH MATCHING
Last modified: 2016-03-27 18:54:40