Analysis of Four Stage Encryption
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 6
Abstract
Four Stage Encryption generates the output alphabet from a given input alphabet. The size of the output alphabet depends upon the key K0. Unless this key is known, it is difficult to guess the size of the output alphabet. Further the output alphabet is permuted with the help of the key K1 and then partitioned using K2. So the encryption scheme is powerful when compared with the existing encryption schemes.
Authors and Affiliations
Dr. Gomatam V S Acharyulu, Sangapu V Appaji
Recent Trends In 4G Over 3G Technology
The objective of this paper is to evaluate recent trends in Fourth generation (4G) mobile services. Given the success of Third generation (3G) mobile communications systems and services, the third generation mobile n...
An Efficient Multideployment and Multisnapshotting in Cloud Computing
Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components.(IaaS)cloud computing has...
Integrity And Confidentiality for Network Security
We compute the liability metric as a function of the steering and the cryptographic protocols used to secure the complex passage. We formulate the minimum cost node capture attack problem as a nonlinear integer progra...
Analyzing Feedback Patterns Using Data Mining Techinque
This paper presents a data mining technique that can be used to study which courses a student will more likely be interested in, during his graduation. The raw data was collected from feedback forms of an institution...
Design of a System Providing Customizable Content-Based Message filtering for OSN’s
For communication and sharing information, Online Social Networks (OSN’s) are being used by everyone is to give users the capability to organize the messages posted on their own private space to keep away from thesur...