CRYPTOGRAPHY

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 1

Abstract

To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting information by transforming it into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable. Database security policies are guidelines for present and future decisions regarding the maintenance of the database security. Database security mechanisms are the functions used to enforce the database security policies.  There are number of security policies that can be applied on data in order to protect the data against unauthorized access. Protecting the data is the prime need of an organization.

Authors and Affiliations

Dr. Vinod Kumar, Er. Gagandeep Raheja, Ms Subeena Sareen

Keywords

Related Articles

A Novel Chaos-Based Stream Cipher for Image Encryption

In this paper, we introduce a novel chaos-based image encryption scheme. We perform our scheme using both the binary form and decimal form of chaotic maps. We also use two chaotic maps; one generates the initial values o...

Analysis and Comparison of Color Features for Content Based Image Retrieval

Creation of a content-based image retrieval system implies solving a number of difficult problems, including analysis of low-level image features and construction of feature vectors, multidimensional indexing, design of...

Enhanced Adaptive Mechanisms to Improve QOS in Distributed Multimedia Applications

Recent advances in computer communications, especially highly interactivedistributed applications and those relying on the transfer of multimedia information and in particular, continuous media flows. It is essential tha...

FROM GRID COMPUTING TO CLOUD INFRASTRUCTURES

As a consequence of the economic crisis, the funds allocated for the development of the IT&C infrastructure in all domains become scarcer, whilst the need for computing services increases day by day and becomes a key...

ON PROBABILTY DISTRIBUTION IN ASSOCIATION WITH A CERTAIN GENERALIZED HYPERGEOMETRIC FUNCTION

In the present paper, a probability function has been introduced in terms of the -function and its properties are studied. It is shown that the classical non-central distributions such as, non-central chi-square, non-cen...

Download PDF file
  • EP ID EP649849
  • DOI 10.24297/ijct.v4i1a.3030
  • Views 138
  • Downloads 0

How To Cite

Dr. Vinod Kumar, Er. Gagandeep Raheja, Ms Subeena Sareen (2013). CRYPTOGRAPHY. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(1), 29-32. https://europub.co.uk/articles/-A-649849