AN INSTINCTIVE APPROACH FOR SECURE COMMUNICATION - ENHANCED DATA ENCRYPTION STANDARD (EHDES)
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
In this article, we establish a new architecture of information security for secure or more secure communication in network. Data encryption process is the main precious and important for secure transaction of information. The identity of key is a essential part of data encryption and decryption process. The base of this proposed scheme is by generating more complex keys during the encryption and decryption. Day by day security of data and safe communication is become comprehensively vital. Due to this current era problem of security, we are trying to enhanced security majors and strength of process fussily possible. We emphasis on the security of data as well as key. We generate various secret keys to moderate key bit value of secret key so that key play the imperative role and make our data as much secure for communication. Random key generation can simply be obtained via use of permutation. Permutation technique can be used in conjunction with other technique includes substitution, encryption function etc. for effective performance.
Authors and Affiliations
Ramveer Singh , Awakash Mishra , D. B. Ojha
Novel Implementation of Text Mining for Reports
In this paper, we propose a text mining system to extract and use the information in radiology reports. The system consists of three main modules: medical finding extractor, report and image retriever. The medical findin...
Micro-Processor based Improved Ultrasonic Direction and Range Finder
This document gives formatting instructions for authors preparing papers for publication in the Proceedings of an IEEE conference. The authors must follow the instructions given in the document for t...
AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION
Automatic image retargeting is used for large image.That are to be fit in small size display devices. Without any loss of information.our proposed methods one is saliency based mesh parameterization method is used to re...
Performance Analysis of Clustering Algorithms in Detecting Outliers
This paper presents the analysis of Kmeans and K-Medians clustering algorithm in detecting outliers. Clustering is generally used in pattern recognition where if a user wants to search for some particular pattern, cluste...
Towards Novel And Efficient Security Architecture For RoleBased Access Control In Grid Computing
Recently, there arose a necessity to distribute computing applications frequently across grids. Ever more these applications depend on services like data transfer or data portal services and submission of...