Enhancing the Communication Channel Through Secure Shell And Irrational DES
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry to less sophisticated user over a broad spectrum.most data transfer are mainly text based not secure and vulnerable to various forms of security risks. So the model that uses SSH for securing channel like intranet/internet which provides client authentication encryption and decryption with high degree of security by transferring the data in an encrypted format, up on this model enhances the efficiency of data transmission by encrypting or decrypting the data with irrational DES. DES is a cryptographic standard however,the applications of it limited because of small key space based on irrational number.Moreover the permutation controlled by data can be performed at high speed in generic cpu.this scheme also expands the key space without costing more to run.and also finally through the combination of secure shell(ssh) and irrational DES not only enhances the security of communication channel.it also provides varius applications like remote user creation,remote user deletion,remote command execution,remote system shutdown ,remote file transfer applications in an highly secure manner.
Authors and Affiliations
S. R. M. Krishna, , Paradeep singh jamwal, , K. padma priya, , P. Hema Vishnu
SEGMENTATION OF OIL SPILL IMAGES USING IMPROVED FCM AND LEVEL SET METHODS.
The main part of image processing and computer vision is Image segmentation. Image segmentation is the task of splitting a digital image into one or more regions of interest. In this paper a robust method for oil spill S...
SPEAKER IDENTIFICATION USING 2-D DCT, WALSH AND HAAR ON FULL AND BLOCK SPECTROGRAM
This paper aims to provide different approaches to text dependent speaker identification using DCT, Walsh and Haar transform along with use of spectrograms. Spectrograms obtained from speech samples are used as image dat...
A New Method for Finding an Optimal Solution for Transportation Problems
In this paper a new method named ASM-Method is proposed for finding an optimal solution for a wide range of transportation problems, directly. A numerical illustration is established and the optimality of the result yiel...
FREQUENT DATA GENERATION USING RELATIVE DATA ANALYSIS
Traditional association rule mining method mines association rules only for the items bought by the customer. However an actual transaction consists of the items bought by the customer along with the quantity of items bo...
Encryption using XOR based Extended Key for Information Security – A Novel Approach
The explosive growth of information, places a high demand for Information Security. Information Security deals with securing the information from unauthorized access or misuse of information either intentionally or accid...