An Efficient And Secure Cryptography Techniques Usingunimodular Matrix

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1

Abstract

Abstract: In day to day life, transmission of data from sender to receiver with security is very difficult. "Cryptography" is one of the famous techniques which provide security for confidential data. Cryptography is one of the best techniques for the secure data transmission. Confidentiality of data, access control and nonrepudiation are the main goals of cryptography. The existing system is having limitations related to decrypts of Armstrong numbers. But the algorithm used in the proposed method uses unimodular matrix for encryption. Therefore, access control, non-repudiation and confidentiality of data is maintained.

Authors and Affiliations

ApurvaK. Vangujar , Kajal Agrawal

Keywords

Related Articles

 Artificial Neural Network For Recognition Of HandwrittenDevanagari Character

 Abstract: Information gathering is one of the most important thing in the digital world, manyorganizationsstill use handwritten documents for storing their information. So it is important task to convert this infor...

 A Review Paper on Cross Platform Mobile ApplicationDevelopment IDE

 Abstract: Cross Platform Mobile Application Development is the development of mobile based applications sothat the development of these types of applications can be made platform-independent. A review has been made...

 Scalable parallel clustering using modified Firefly algorithm

 Abstract: Clustering is the process of assigning data objects into a set of disjoint groups called clusters so that objects in each cluster are more similar to each other than objects from different clusters. We tr...

 Evaluation on a Simulated Annealing based Model for Solving Job Shop Scheduling Problem

 The stochastic optimization techniques were commonly used in solving several optimization problems. There are different types of these algorithms that were addressed in several previous works. In our previous w...

 Steps to System Reconfiguration in a Distributed DatabaseSystem: A Fault-tolerant Approach

 Abstract: In this paper, we examine steps to system reconfiguration in a Distributed Database using some faulttolerance scheme for a distributed database system that is compatible with respect to system failure i.e...

Download PDF file
  • EP ID EP138481
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

ApurvaK. Vangujar, Kajal Agrawal (2016). An Efficient And Secure Cryptography Techniques Usingunimodular Matrix. IOSR Journals (IOSR Journal of Computer Engineering), 18(1), 19-22. https://europub.co.uk/articles/-A-138481