A Dual Text Encryption Model using Hyper Encryption and Geometric Cryptography
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 8
Abstract
the security of cryptosystem has always been a problem. There are number of protocols that provide the attainable security. Hyper Encryption is one of the Encryption protocols that provide the everlasting security. But in today’s era where with the maximum use of technology the eavesdropper power has been increased really very much. So there is a need of increased security. But the security of text based encryption scheme is always at risk. If we use graphical shape for the encryption with the text based encryption we can provide a better security layer. In this paper we are going to propose a hybrid encryption approach with the Hyper Encryption and Geometric Cryptography in this we will use the two layer security and try to make a protocol that provide a better security with a reliable approach
Authors and Affiliations
Ms. Ritu Malik, Ms. Sunita
Object Detection Using Diversified Search by Measuring Objectness of Image Window
Object Detection and recognition is an important job in remote sensing and automation. Conventional object detection approaches are usually not sufficiently sturdy in addressing the variations of targets and typically s...
Operating System Challenges for GPU Resource Management
The graphics processing units(GPU) have rapidly evolved to become high performance accelerators for dataparallel computing. For accelerating graphics and data-parallel compute-intensive applications the GPU is a most pop...
Synthetize and Magnetic Properties of Ni Substituted Polycrystalline Zn-spinel Ferrites
The mixed polycrystalline 1 2 4 Ni Zn Fe O s s ferrites where s is the percentage increments of Zn ions, were prepared using the standard double sintering by mixing pure metal oxides NiO , ZnO and 2 3 Fe O . The netmag...
Defeating scan based attacks on secure AES with on-chip comparison
Hardware implementation of Advanced Encryption Standard (AES) algorithms is subject to various attacks. The scan chains introduced for hardware testability open a back door to potential attacks. Here, a scan-protection...
Sound Signature in Graphical Password
Mostly user select password that is predictable. This happens with both graphical and text based passwords. Users tend to choose memorable password, unfortunately it means that the passwords tend to follow predictable p...