Meticulous Tasks of Various Cryptographic Techniques in Secure Communications

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 5, Issue 4

Abstract

Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and provides in-depth analysis of these techniques. This paper also provides a discussion of how the two related fields of encryption and hash functions are complementary, not replacement technologies for one another.

Authors and Affiliations

Dr. P. Ramesh Babu , D. Nagamalleswara Rao , Hunde Merga Dugassa , Abebe Gemeda

Keywords

Related Articles

Minimizing Spurious Patterns Using Association Rule Mining

Most of the clustering algorithms extract patterns which are of least interest. Such pattern consists of data items which usually belong to widely different support levels. Such data items belonging to different support...

A Privacy Preserving of Composite Private/Public Key in Cloud Servers

Security is a term used to provide secrecy of data from the illegal entries. It is used to prevent a user that he/she should not have access to. It is a two step process. The security system in the first step identifies...

Energy Saving Technique in Wireless Mobile Ad-hoc Network for Reliable Communication

Mobile Ad hoc Network (MANET) consists of a group of mobile nodes that can be communicated with each other wirelessly without the need to any existed communications. Mobile Ad hoc Network (MANET) consists of a group of m...

A Proposed Methodology for Virus Detection Using Data Mining and Reverse Engineering Tools with Client-Server Model

Viruses are a class of malicious programs that cause unfavourable effects on the computer system and thereby becomes an obstacle to the standard operation of the system. Their existence and execution within the system sh...

Mining of Spatially Co-Located Moving Objects by Using CTMSPMINE

In day to day life, vehicles have become important aspects in human life where each vehicle is manufactured for a particular purpose. Co-location pattern discovery is intended towards the processing data with spatial per...

Download PDF file
  • EP ID EP146757
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

Dr. P. Ramesh Babu, D. Nagamalleswara Rao, Hunde Merga Dugassa, Abebe Gemeda (2013). Meticulous Tasks of Various Cryptographic Techniques in Secure Communications. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 5(4), 214-220. https://europub.co.uk/articles/-A-146757