Methods for Protection of Key in Private Key Cryptography

Abstract

The susceptible nature of information against forthcoming threats has become a ponderous affair for the professionals of this field. It is a result of the rational and steady struggle by the carrying people that has produced multiple approaches which shields vital information from speculated security attacks. For the everyday users who are unfamiliar of these potential incursion(s) to their intimate information, feel helpless when they encounter persecutor(s) who wish to exploit the confidentiality of this elemental information. Here we have discussed about a distinctive approach which deal with these upcoming attacks. We have tried to produce an algorithm which will safeguard users against objectionable invasion of reserved information. We have incorporated a set of diverse techniques to produce an algorithm which is immune to these incursions. These methods interpolate perceptions like Hybrid cryptography [3], R.S.A. algorithm [1], Key management, Hash functions or Encrypted key exchange.

Authors and Affiliations

NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav

Keywords

Related Articles

Identification of the Barriers of Lean Construction Implementation in Construction Projects- A Review

In the current era of industrial and enterprise evolution, time and resource are the fundamental need of any industry. Utilizing the time and resource has always been the primary goal of especially a construction project...

Adaptive E-Learning Based on Technology of Learning Navigation

E-learning as we know it has been around for ten years or so. During that time, it has emerged from being a radical idea---the effectiveness of which was yet to be proven---to something that is widely regarded as mainstr...

Enhancing Liver Segmentation: A Deep Learning Approach with EAS Feature Extraction and Multi-Scale Fusion

Deep learning technology have been broadly used in segmentation tasks of liver. To address the limitation of suboptimal segmentation for small targets, an end-to-end EAS(ECA-Attention and Separable convolution) U-Net is...

Behavior of Castellated Beams with and Without Stiffeners

Castellated beam applications for diverse buildings are quickly gaining popularity. This is a result of the section's enhanced depth without adding weight, excellent strength-to-weight ratio, low maintenance requirements...

Exploring the Synergy of Web Usage Data and Content Mining for Personalized Effectiveness

In light of the exponential growth of web data and user volume, individuals are increasingly overwhelmed by information overload on the internet. Addressing this challenge, our study focuses on enhancing web information...

Download PDF file
  • EP ID EP748481
  • DOI 10.21276/ijircst.2017.5.2.5
  • Views 53
  • Downloads 0

How To Cite

NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav (2017). Methods for Protection of Key in Private Key Cryptography. International Journal of Innovative Research in Computer Science and Technology, 5(2), -. https://europub.co.uk/articles/-A-748481