IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 2
Abstract
The demand for adequate security to electronic data system grows high over the decades. Security is the one of the biggest concern in different type of networks. Due to diversify nature of network, security breaching became a common issue in different form of networks. Solutions for network security comes with concepts like cryptography in which distribution of keys have been done. Encryption and key generation became a vital tool for preventing the threats to data sharing and tool to preserve the data integrity so we are focusing on security enhancing by enhancing the level of encryption in network. This study’s main goal is to reflect the importance of security in network and provide the better encryption technique for currently implemented encryption techniques in simple and powerful method. In our research we have proposed a modular 37 and select any number and calculate inverse of the selected integer using modular 37. The symmetric key distribution should be done in the secured manner. Also, we examine the performance of our new SSK algorithm with other existing symmetric key algorithm.
Authors and Affiliations
Prakash Kuppuswamy, Dr. Saeed Q Y Al-Khalidi
Gradient observability and sensors for hyperbolic systems
The aim of this paper is to develop useful rigorous results related tothe gradient observability and sensors. The concept of gradient strategic sensors is characterized and applied to the wave equation. This emphasizes t...
VIRTUAL REALITY IN EDUCATION: TRENDS AND ISSUES
Computer-mediated learning is becoming an increasingly common form of education in institutions of higher learning (IHL). Many IHL in developing nations, such as Kenya, have greatly experienced an increase in demand for...
ROLE OF NGO IN FILLING THE GAP OF GOVERNMENT (A Case Study of Indus Resource Centre khairpur, Sindh Pakistan)
Role of non- government organization in filling the gap of government was studied through a study conducted on Indus Resource Centre. Government gap is created when some areas are being deprived of Government efforts. Th...
Chaos Baker-based Image Encryption in Operation Modes
This research paper study the application of chaos baker map for digital image encryption in different operation modes. The employed modes include the electronic code book (ECB), cipher block chai...
A SURVEY ON LOAD BALANCING IN CLOUD ENVIRONMENT
In present days cloud computing is one of the greatest platform which provides storage of data in very lower cost and available for all time over the internet.But it has more critical issue like security, load management...