IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 2

Abstract

The demand for adequate security to electronic data system grows high over the decades. Security is the one of the biggest concern in different type of networks. Due to diversify nature of network, security breaching became a common issue in different form of networks. Solutions for network security comes with concepts like cryptography in which distribution of keys have been done. Encryption and key generation became a vital tool for preventing the threats to data sharing and tool to preserve the data integrity so we are focusing on security enhancing by enhancing the level of encryption in network. This study’s main goal is to reflect the importance of security in network and provide the better encryption technique for currently implemented encryption techniques in simple and powerful method. In our research we have proposed a modular 37 and select any number and calculate inverse of the selected integer using modular 37. The symmetric key distribution should be done in the secured manner. Also, we examine the performance of our new SSK algorithm with other existing symmetric key algorithm.

Authors and Affiliations

Prakash Kuppuswamy, Dr. Saeed Q Y Al-Khalidi

Keywords

Related Articles

Gradient observability and sensors for hyperbolic systems

The aim of this paper is to develop useful rigorous results related tothe gradient observability and sensors. The concept of gradient strategic sensors is characterized and applied to the wave equation. This emphasizes t...

VIRTUAL REALITY IN EDUCATION: TRENDS AND ISSUES

Computer-mediated learning is becoming an increasingly common form of education in institutions of higher learning (IHL). Many IHL in developing nations, such as Kenya, have greatly experienced an increase in demand for...

ROLE OF NGO IN FILLING THE GAP OF GOVERNMENT (A Case Study of Indus Resource Centre khairpur, Sindh Pakistan)

Role of non- government organization in filling the gap of government was studied through a study conducted on Indus Resource Centre. Government gap is created when some areas are being deprived of Government efforts. Th...

Chaos Baker-based Image Encryption in Operation Modes

This research paper study the application of chaos baker map for digital image encryption in different operation modes. The  employed modes include the  electronic  code  book (ECB), cipher block chai...

A SURVEY ON LOAD BALANCING IN CLOUD ENVIRONMENT

In present days cloud computing is one of the greatest platform which provides storage of data in very lower cost and available for all time over the internet.But it has more critical issue like security, load management...

Download PDF file
  • EP ID EP649958
  • DOI 10.24297/ijct.v3i2c.2896
  • Views 103
  • Downloads 0

How To Cite

Prakash Kuppuswamy, Dr. Saeed Q Y Al-Khalidi (2012). IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 3(2), 335-338. https://europub.co.uk/articles/-A-649958