ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURITY OBJECTS REGISTER

Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.7, No. 2)

Publication Date:

Authors : ; ;

Page : 36-43

Keywords : Cryptography; Datagram Protocol; Cipher; Decipher; AES; CSOR; Iaeme Publication; IAEME; Technology; Engineering; IJCET;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cryptography is the scientific study of mathematical and algorithmic techniques relating to information security. Cryptographic techniques will help to protect information in cases where an attacker can have physical access to the bits representing the information, ex. When the information has to be sent over a communication channel that can be eaves dropped on by an attacker. Cryptographic primitives are the basic building blocks for constructing cryptographic solutions to information protection problems. A cryptographic primitive consists of one or more algorithms that achieve a number of protection goals. There is no well-agreed upon complete list of cryptographic primitives, nor are all cryptographic primitives independent, it is often possible to realize one primitive using a combination of other primitives.

Last modified: 2016-05-24 21:30:50