ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURITY OBJECTS REGISTER
Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.7, No. 2)Publication Date: 2016-04-23
Authors : R. MALA; K. KARTHIKEYAN;
Page : 36-43
Keywords : Cryptography; Datagram Protocol; Cipher; Decipher; AES; CSOR; Iaeme Publication; IAEME; Technology; Engineering; IJCET;
Abstract
Cryptography is the scientific study of mathematical and algorithmic techniques relating to information security. Cryptographic techniques will help to protect information in cases where an attacker can have physical access to the bits representing the information, ex. When the information has to be sent over a communication channel that can be eaves dropped on by an attacker. Cryptographic primitives are the basic building blocks for constructing cryptographic solutions to information protection problems. A cryptographic primitive consists of one or more algorithms that achieve a number of protection goals. There is no well-agreed upon complete list of cryptographic primitives, nor are all cryptographic primitives independent, it is often possible to realize one primitive using a combination of other primitives.
Other Latest Articles
- ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
- ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES
- WEARABLE HEALTH MONITORING SYSTEM FOR BABIES
- TEMPERATURE CONTROL AND DATA ACQUISITION METHOD FOR FACTORY USING LABVIEW
- ROLE OF SUBSTANTIAL CHARACTERISTICS IN ELECTRONIC NOSE SENSOR SELECTION FOR DIVERSE APPLICATIONS
Last modified: 2016-05-24 21:30:50