Enhanced authentication based security using TDES and MD5
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 7
Abstract
For secure authentication over the internet and secure data transfer purposed using cryptography technique which provide high security. Encryption of an image, audio encryption, chaos based encryption contain various applications in numerous fields, concluding internet communication, transmission, medical imaging. Encryption is the most general method for image security promoting. Image encryption, video encryption, chaos centered encryption have functions in countless fields together with medical imaging, Tele-treatment and military communication, etc. in this paper using TDES and MD5 for secure authentication. In cryptography, firstly DES algorithm using for high security using 3DES and also called TDES. MD5 is an algorithm that's used to the data integrity authenticate with the aid in the production of a 128-bit message. Digest from information input (which may be an any length message) that is claimed to be as unique to that particular information. In this paper provide more security using TDES and MD5 on palm image.
Authors and Affiliations
Chirag Singh Sisodia, Aprajit Shrivastava
Importance of Knowledge Areas on Material Management and its Influence over Project Life Cycle
In Construction projects worldwide, nearly 50-60% of the project cost is estimated for materials involved in the project. This shows the importance of material management in construction industry. Proper management of m...
Transmission of Numeric Data and Voice Using Light Fidelity (LIFI) Technology
LIFI is a field of research which has to cover several miles in each and every phase to prove its efficacy as a potent technology that holds the strength to challenge the wide ranging technology today. Be it the radio s...
Exploration of Novel Algorithm for Reduced Computational Time by Using Fuzzy Classification Technique in Data Mining
we will work on reduction of unwanted data sets from large data sets. We apply fuzzy logic , classification and data mining techniques to do the same. The size of data items is very large, so it is difficult to reduce i...
On Almost Cosymplectic Manifolds
In this paper, we have studied almost cosymplectic manifold and it's relation with affinely almost cosymplectic and affinely almost nearly cosymplectic manifold. Affine connexions and geodesics have also been discussed.
Investigation on Openstack Nova Scheduler for Customizing Enterprise Private Cloud
Cloud computing is a concept which includes the disciplines like, business models and technologies together to deliver IT capabilities with minimum effort and easy to manage. Cloud is commonly divided into two types, pu...