Auto Mutating Cryptosystem- An approach towards better security
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: The concept of learning systems has been an intriguing one since first appearance of Artificial Intelligence (AI) in literature. With the progress in each decade of research, new systems have been developed to suit a host of requirements and environments. However the idea of AI with a cryptosystem is relatively novel and is less explored. This paper discusses the implementation and analysis of multiple cryptosystems with an AI engine to provide better security for information. Here the attempt is made to combine number of cryptosystems with an AI engine to understand a situation where a hacker is trying to cryptanalyse data and prevent it from happening.
Authors and Affiliations
Harsha S , N Bhaskar , M N Sheshaprakash , G Raghavendra Rao
Privacy Preserving and Load Balancing For Secure Cloud Storage
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data sto...
Enhanced Message Digest Version 5 Architecture for Secure Hashing
Abstract: The message digest algorithm is a widely used cryptographic hash function. It produces a 128-bit hash value. It has been used in a variety of security applications and is also commonly used to check data...
Differentiating Algorithms of Cloud Task Scheduling Based on various Parameters
Abstract: Cloud computing is a new design structure for large, distributed data centers. Cloud computing system promises to offer end user “pay as go” model. To meet the expected quality requirements of users, cloud comp...
A survey of Stemming Algorithms for Information Retrieval
Abstract:Now a day’s text documents is advancing over internet, e-mails and web pages. As the use of internetis exponentially growing, the need of massive data storage is increasing. Normally many of the documentscontain...
Modeling and Threshold Sensitivity Analysis of Computer VirusEpidemic
Abstract: This paper analyzed the methods and techniques used in mathematical modeling of biologicalepidemics to the domain of information technology. A new epidemic model has been proposed byincorporating a range...