ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Intruder Proof and Secure Cryptography?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 6)

Publication Date:

Authors : ; ;

Page : 28-33

Keywords : Encryption; Cryptanalyst; Decryption; Intruder; Public key; Private Key;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is a science of protecting information by encoding it into an unreadable format. Although the ultimate goal of cryptography, and the mechanisms that make it up, is to hide information from unauthorized individuals, most algorithms can be broken and the information can be revealed if the attacker has enough time, desire, and resources. This paper presents the way of protecting the information from: ? Intruders: those who capture the packet and alter the information. ? Cryptanalysts: those who decrypt cipher text into plain text without key.

Last modified: 2014-06-05 15:20:01