Auto Mutating Cryptosystem- An approach towards better security

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4

Abstract

Abstract: The concept of learning systems has been an intriguing one since first appearance of Artificial Intelligence (AI) in literature. With the progress in each decade of research, new systems have been developed to suit a host of requirements and environments. However the idea of AI with a cryptosystem is relatively novel and is less explored. This paper discusses the implementation and analysis of multiple cryptosystems with an AI engine to provide better security for information. Here the attempt is made to combine number of cryptosystems with an AI engine to understand a situation where a hacker is trying to cryptanalyse data and prevent it from happening.

Authors and Affiliations

Harsha S , N Bhaskar , M N Sheshaprakash , G Raghavendra Rao

Keywords

Related Articles

 Privacy Preserving and Load Balancing For Secure Cloud Storage

 Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data sto...

 Enhanced Message Digest Version 5 Architecture for Secure Hashing

 Abstract: The message digest algorithm is a widely used cryptographic hash function. It produces a 128-bit hash value. It has been used in a variety of security applications and is also commonly used to check data...

Differentiating Algorithms of Cloud Task Scheduling Based on various Parameters

Abstract: Cloud computing is a new design structure for large, distributed data centers. Cloud computing system promises to offer end user “pay as go” model. To meet the expected quality requirements of users, cloud comp...

 A survey of Stemming Algorithms for Information Retrieval

Abstract:Now a day’s text documents is advancing over internet, e-mails and web pages. As the use of internetis exponentially growing, the need of massive data storage is increasing. Normally many of the documentscontain...

 Modeling and Threshold Sensitivity Analysis of Computer VirusEpidemic

 Abstract: This paper analyzed the methods and techniques used in mathematical modeling of biologicalepidemics to the domain of information technology. A new epidemic model has been proposed byincorporating a range...

Download PDF file
  • EP ID EP123285
  • DOI -
  • Views 103
  • Downloads 0

How To Cite

Harsha S, N Bhaskar, M N Sheshaprakash, G Raghavendra Rao (2016). Auto Mutating Cryptosystem- An approach towards better security. IOSR Journals (IOSR Journal of Computer Engineering), 18(4), 42-46. https://europub.co.uk/articles/-A-123285