Methods for Protection of Key in Private Key Cryptography

Abstract

The susceptible nature of information against forthcoming threats has become a ponderous affair for the professionals of this field. It is a result of the rational and steady struggle by the carrying people that has produced multiple approaches which shields vital information from speculated security attacks. For the everyday users who are unfamiliar of these potential incursion(s) to their intimate information, feel helpless when they encounter persecutor(s) who wish to exploit the confidentiality of this elemental information. Here we have discussed about a distinctive approach which deal with these upcoming attacks. We have tried to produce an algorithm which will safeguard users against objectionable invasion of reserved information. We have incorporated a set of diverse techniques to produce an algorithm which is immune to these incursions. These methods interpolate perceptions like Hybrid cryptography [3], R.S.A. algorithm [1], Key management, Hash functions or Encrypted key exchange.

Authors and Affiliations

NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav

Keywords

Related Articles

Effects of Basketball Shooting Distance on Release Angle

Basketball, as one of the most popular sports worldwide, has attracted approximately 450 million participants. Studies show that nearly half of the points scored in a game come from jump shots, making it an indispensable...

Deep Web Crawler: A Review

In today’s scenario, there is an ample amount of data on the internet that can be accessed by everyone. This is the data that can be indexed by search engines. There are softwares named Web Crawlers that explore the WWW...

A Strong Blind Signature Using Cascade Blind Factors

This paper presents a modified version of blind signature . The proposed method adds more complex blind factors to increase the blindeness property of the message sent . In order to achieve this goal , the proposed syste...

Navigating the Evolution: Current Trends and Future Directions in Programming Languages

In the complex realm of software development, the progression of programming languages exemplifies the field's dynamic nature. This review paper embarks on a meticulous journey, delving into historical milestones, dissec...

Impact of Agriculture on Water Pollution: A Review

Agriculture significantly alters the natural condition of all freshwater systems. Examining specific impacts of certain chemicals on separate taxa or sub-societies in river systems was the previous reductionist notion of...

Download PDF file
  • EP ID EP748481
  • DOI 10.21276/ijircst.2017.5.2.5
  • Views 67
  • Downloads 0

How To Cite

NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav (2017). Methods for Protection of Key in Private Key Cryptography. International Journal of Innovative Research in Computer Science and Technology, 5(2), -. https://europub.co.uk/articles/-A-748481