Four Stage Encryption
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 4
Abstract
Symmetric key Block ciphers have proven and widely used encryption and decryption methods. Still they lack security without proper modes of operations. A four stage encryption method suggested in this paper provides a stronger secured encryption scheme by itself even without implementing any modes of operation.
Authors and Affiliations
Gomatam Venkata Sudarsan Acharyulu, Sangapu V Appaji
Unique i : An Integrated Automated Altered Fingerprint Identification System
Fingerprint identification systems are very useful in several biometric applications. They are capable of finding correct person with proper identification. Fingerprint identification systems are based on fingerprint...
Integrity And Confidentiality for Network Security
We compute the liability metric as a function of the steering and the cryptographic protocols used to secure the complex passage. We formulate the minimum cost node capture attack problem as a nonlinear integer progra...
An Efficient Method for Steganography in Videos
This paper applies steganography algorithm in videos. In proposed method we are hiding the data in a compressed video by using optimal pixel adjustment process (OPAP). Secrete Message is first encrypted by using cryp...
Dynamic ModelingAnd Control Of Wind/Pv/Battery Sources Integrated For Distributed Energy Production
This paper proposes a cross breed vitality framework comprising of wind, photovoltaic and energy component. Battery stockpiling is intended to supply persistent force and to give the deficiency power when the joined...
Short Term Load Forecasting Using Artificial Neural Networks
The main objective of the paper is to forecast the load for the next 24 hours, as well one week, considering one month of load data. Load forecasting is an important problem in the operation and planning of electrica...