Methods for Protection of Key in Private Key Cryptography
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2017, Vol 5, Issue 2
Abstract
The susceptible nature of information against forthcoming threats has become a ponderous affair for the professionals of this field. It is a result of the rational and steady struggle by the carrying people that has produced multiple approaches which shields vital information from speculated security attacks. For the everyday users who are unfamiliar of these potential incursion(s) to their intimate information, feel helpless when they encounter persecutor(s) who wish to exploit the confidentiality of this elemental information. Here we have discussed about a distinctive approach which deal with these upcoming attacks. We have tried to produce an algorithm which will safeguard users against objectionable invasion of reserved information. We have incorporated a set of diverse techniques to produce an algorithm which is immune to these incursions. These methods interpolate perceptions like Hybrid cryptography [3], R.S.A. algorithm [1], Key management, Hash functions or Encrypted key exchange.
Authors and Affiliations
NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav
Performance, Emission & Combustion Characteristics of I.C Engine Using Jatropha Methyl Ester Oil and Bio-Diesel Blends
This essay is focused on the idea of suggesting an alternative fuel for diesel engines. The experiments show that the diesel-biodiesel blends can be used as substitute fuels for diesel engines. Recent studies have demons...
Fog Computing: A Conceptual and Practical Overview
Electronic gadgets, appliances, medical equipment, cameras, sensors, and cars are all part of the Internet of Things (IoT), which enables smart cities and infrastructure. It is predicted based on evidences that a minimum...
Impact of Test Automation and Test Case Design Techniques - Challenges
Test Automation is more than a set of tests run to generate apparent results. It includes designing testware, implementing automated test cases, and monitoring and interpreting a broad range of results. Automation by sim...
A Novel Rhombus Shaped Multiband Antenna for Wireless Applications
A 30X20X1.6mm3 Novel Rhombus Shaped ring type multiband Antenna was proposed in this paper. The Antenna has 25x15mm2 partial ground inserted below the FR4 Epoxy Substrate to improve performance of Antenna. In addition,...
Deepfakes Technologgy Using Artificial Intelligence
In spite of the fact that controls of visual and hear-able media are just about as old as media themselves, the new entry of deepfakes has denoted a defining moment in the formation of phony substance. Fueled by the most...