Intruder Proof and Secure Cryptography?Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 6)
Publication Date: 2014-06-30
Authors : Ravinder Sangwan; Anshul Anand;
Page : 28-33
Keywords : Encryption; Cryptanalyst; Decryption; Intruder; Public key; Private Key;
Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is a science of protecting information by encoding it into an unreadable format. Although the ultimate goal of cryptography, and the mechanisms that make it up, is to hide information from unauthorized individuals, most algorithms can be broken and the information can be revealed if the attacker has enough time, desire, and resources. This paper presents the way of protecting the information from: ? Intruders: those who capture the packet and alter the information. ? Cryptanalysts: those who decrypt cipher text into plain text without key.
Other Latest Articles
Last modified: 2014-06-05 15:20:01