Methods for Protection of Key in Private Key Cryptography

Abstract

The susceptible nature of information against forthcoming threats has become a ponderous affair for the professionals of this field. It is a result of the rational and steady struggle by the carrying people that has produced multiple approaches which shields vital information from speculated security attacks. For the everyday users who are unfamiliar of these potential incursion(s) to their intimate information, feel helpless when they encounter persecutor(s) who wish to exploit the confidentiality of this elemental information. Here we have discussed about a distinctive approach which deal with these upcoming attacks. We have tried to produce an algorithm which will safeguard users against objectionable invasion of reserved information. We have incorporated a set of diverse techniques to produce an algorithm which is immune to these incursions. These methods interpolate perceptions like Hybrid cryptography [3], R.S.A. algorithm [1], Key management, Hash functions or Encrypted key exchange.

Authors and Affiliations

NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav

Keywords

Related Articles

Knowledge Representation for Legal Document Summarization

This paper presents a novel approach for legal document summarization. Proposed approach is based on Ripple-Down Rules (RDR). It is an incremental knowledge acquisition method. RDR allows us to quickly build an extendabl...

Face Recognition Technology for Automatic Attendance System

The attendance system is essential in schools and colleges. There are several drawbacks to manual attendance systems, including the fact that they are less dependable and difficult to maintain. This enhances accuracy whi...

Comparative Analysis of Linear and Digitalized Thermal Wave Imaging Methods

In order to identify surface features of an object, active thermal non-destructive testing (TNDT) techniques use the surface temperature profile that has been measured over the object. To improve the flaw detectability u...

Detecting and Preventing ARP Spoofing Attacks Using Real-Time Data Analysis and Machine Learning

ARP spoofing attacks contain certain risks in networks as they seem to intercept traffic and can lead the leakage of intellectual information. This research paper focuses on enhancing the method through which five algori...

A Study of Several Water Purification Techniques

Current article provides an overview of current water purification, filtration methods, & technologies. water purification is primarily addressed for a sensitive reason: it is one of most important sources of survival f...

Download PDF file
  • EP ID EP748481
  • DOI 10.21276/ijircst.2017.5.2.5
  • Views 46
  • Downloads 0

How To Cite

NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav (2017). Methods for Protection of Key in Private Key Cryptography. International Journal of Innovative Research in Computer Science and Technology, 5(2), -. https://europub.co.uk/articles/-A-748481