Methods for Protection of Key in Private Key Cryptography

Abstract

The susceptible nature of information against forthcoming threats has become a ponderous affair for the professionals of this field. It is a result of the rational and steady struggle by the carrying people that has produced multiple approaches which shields vital information from speculated security attacks. For the everyday users who are unfamiliar of these potential incursion(s) to their intimate information, feel helpless when they encounter persecutor(s) who wish to exploit the confidentiality of this elemental information. Here we have discussed about a distinctive approach which deal with these upcoming attacks. We have tried to produce an algorithm which will safeguard users against objectionable invasion of reserved information. We have incorporated a set of diverse techniques to produce an algorithm which is immune to these incursions. These methods interpolate perceptions like Hybrid cryptography [3], R.S.A. algorithm [1], Key management, Hash functions or Encrypted key exchange.

Authors and Affiliations

NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav

Keywords

Related Articles

Prediction of Sediment Inflow in Reservoirs

Sediment in hydraulic flow plays significant role because of complexity of its bed and the flow from multi direction with the variation of its forces. Accretion and erosion at river bed, banks, dams and power intake stru...

The New Topology of Multi Level Inverter with Minimum of Switches

A new multilayer inverter topology is proposed in this study. The cascaded feature is used in this innovative topology. In addition to the isolated DC sources seen in Cascaded H-bridge. The clamping diode in Diode and th...

Tri-Strip Monopole Antenna for LTE, WLAN and WiMAX Communication Applications

In this research, we present a Tri-strip monopole antenna for LTE, WLAN (Wireless Local Area Network) and WIMAX (Wireless interoperability for microwave access) Applications. This is due to the fact that wireless applica...

IoT Based Healthcare System

Health is a fundamental need. It is also a human right to have access to high-quality health care. Due to a lack of resources, India is now dealing with a slew of health problems. This review article discusses the concep...

Agriculture Sector Improvement Implementing IoT

The agricultural industry plays an essential role in overcoming the food scarcity scenarios for food security globally in the rising population scenario. In the agricultural sector, mechanization has improved various cro...

Download PDF file
  • EP ID EP748481
  • DOI 10.21276/ijircst.2017.5.2.5
  • Views 40
  • Downloads 0

How To Cite

NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav (2017). Methods for Protection of Key in Private Key Cryptography. International Journal of Innovative Research in Computer Science and Technology, 5(2), -. https://europub.co.uk/articles/-A-748481