AN INSTINCTIVE APPROACH FOR SECURE COMMUNICATION - ENHANCED DATA ENCRYPTION STANDARD (EHDES)
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
In this article, we establish a new architecture of information security for secure or more secure communication in network. Data encryption process is the main precious and important for secure transaction of information. The identity of key is a essential part of data encryption and decryption process. The base of this proposed scheme is by generating more complex keys during the encryption and decryption. Day by day security of data and safe communication is become comprehensively vital. Due to this current era problem of security, we are trying to enhanced security majors and strength of process fussily possible. We emphasis on the security of data as well as key. We generate various secret keys to moderate key bit value of secret key so that key play the imperative role and make our data as much secure for communication. Random key generation can simply be obtained via use of permutation. Permutation technique can be used in conjunction with other technique includes substitution, encryption function etc. for effective performance.
Authors and Affiliations
Ramveer Singh , Awakash Mishra , D. B. Ojha
E-Governance and Effective Deliverance of Information and Services to Citizens Architecture
By Progression of information technology resources in India, great opportunity comes to deliver information and services to citizens and business. Proper distribution and delivery of government information and services t...
PERFORMANCE COMPARISION OF QOS STABILITY METHODS IN WIMAX NETWORKS
Recently IEEE 802.16 WiMAX has attracted a lot of attention in wireless networking research and applications. An attempt had been made to compare DropTail, RED, Proportional fairness and DRR protocol...
A Model of MULTI-VERIFIER channel e-mailing system using Steganographic scheme
In this paper, we presented a model of privileged channel e-mailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model a sender can send a secret m...
Retrieving Business Applications using Open Web API’s Web Mining – Executive Dashboard Application Case Study
Web mining is new area of research in information technology; so many business applications that utilize data mining and text mining techniques to extract useful business information on the we...
Information Technology (IT) Security Management in Kenyan Small and Medium Enterprises (SMEs)
The aim of this paper is to study the management of Information Technology (IT) security in Kenyan Small and Medium Enterprises (SMEs). Particularly, this study looks at whether SMEs have a designated employee in charge...