Enhancing the Communication Channel Through Secure Shell And Irrational DES
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry to less sophisticated user over a broad spectrum.most data transfer are mainly text based not secure and vulnerable to various forms of security risks. So the model that uses SSH for securing channel like intranet/internet which provides client authentication encryption and decryption with high degree of security by transferring the data in an encrypted format, up on this model enhances the efficiency of data transmission by encrypting or decrypting the data with irrational DES. DES is a cryptographic standard however,the applications of it limited because of small key space based on irrational number.Moreover the permutation controlled by data can be performed at high speed in generic cpu.this scheme also expands the key space without costing more to run.and also finally through the combination of secure shell(ssh) and irrational DES not only enhances the security of communication channel.it also provides varius applications like remote user creation,remote user deletion,remote command execution,remote system shutdown ,remote file transfer applications in an highly secure manner.
Authors and Affiliations
S. R. M. Krishna, , Paradeep singh jamwal, , K. padma priya, , P. Hema Vishnu
Multi-party Quantum Communication in biological Cells
An Algorithm for Better Decision Tree
The present paper aims at constructing the decision tree for a given database which adopts an improved ID3 decision tree algorithm to implement data mining in order to predict the output. The database is generated using...
Implementing Ant Colony Optimization for Test Case Selection and Prioritization
Regression Testing is an inevitable and a very costly activity to be performed, often in a time and resource constrained environment. Thus we use techniques like Test Case Selection and Prioritization, to select and prio...
Security Enhancement Using Mutual Authentication in Existing CDMA Systems
Abstract— Even though CDMA2000 wireless networks are being widely deployed as a cellular digital standard around the world, it has some hidden vulnerabilities concerned with security issues. The existing CDMA systems use...
A Fuzzy Integrated Ontology Model to Manage Uncertainty in Semantic Web: The FIOM
Semantic web, also known as next generation web, aims to provide context based information and services to the user. Although, ontologies play key role in implementation and exploitation of semantic web, however these fa...