An Efficient And Secure Cryptography Techniques Usingunimodular Matrix
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: In day to day life, transmission of data from sender to receiver with security is very difficult. "Cryptography" is one of the famous techniques which provide security for confidential data. Cryptography is one of the best techniques for the secure data transmission. Confidentiality of data, access control and nonrepudiation are the main goals of cryptography. The existing system is having limitations related to decrypts of Armstrong numbers. But the algorithm used in the proposed method uses unimodular matrix for encryption. Therefore, access control, non-repudiation and confidentiality of data is maintained.
Authors and Affiliations
ApurvaK. Vangujar , Kajal Agrawal
Level of Interleukin 8 and Alpha -1 Antitrypsin in CerebroSpinal Fuid of Iraqi Patient with Bacterial and Viral Meniningitis
Objective: Meningitis refers to inflammation of the leptomeninges, the connective tissue layers in closest proximity to the surface of the brain. Meningitis can be caused by bacteria, viruses, parasites, and fungi, as we...
Estimation of Word Net-Based Lexical Semantic Similarity Measure for Telugu Documents
The estimation of lexical semantic relatedness has numerous applications in NLP. Several measures are available for the evaluation of lexical semantic relatedness. This paper presents two approaches for measuring...
Celllls breaks tthe Tor’’s Anonymiitty:: Oniion Routter
To hide the communication of users, the anonymity systems pack the application data into equal – sized cells. The size of IP packets in the Tor network can be very dynamic and the IP layer may be repack cells....
Satellite Image Classification By Neural Networks And Fuzzy Inference System For
This paper studies the performance and efficiency of the classification approaches on the satellite images. In this work, two methods will be used for image classification: the neural network and fuzzy inference methods....
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery
The field of Adhoc Network has gained an important part of the interest of researchers and become very popular in last few years. Adhoc network can operate without fixed infrastructure and can survive rapid &nbs...