Network Security: A Study Using Cryptography Techniques

Abstract

We are study Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software , and information in a network. Only one particular element underlies many of the security mechanisms in use: Cryptographic techniques; hence our focus is on this area Cryptography. Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication.

Authors and Affiliations

vijayaTushar Gaikwad, Mayur Patil, Prof. Vijaya Sagvekar, Prof. Divya Racha

Keywords

Related Articles

IOT Based Energy Monitoring and Control Device

Energy monitoring and conservation holds prime importance in today’s world because of the imbalance between power generation and demand. The current scenario says that the power generated, which is primarily contributed...

A Review on Recent Routing Protocols in Field of Wireless Communication

Routing is used to find the shortest distance between the different nodes from source to destination. Routing is basically used to find the efficient path to send the packets from source to destination. In the tradition...

Ethanol Fuelled SI Engine For The Measurement Of Acetaldehyde Emission

The Ethanol-gasoline blend is utilized in this work to measure the acetaldehyde (CH3CHO) coming out from the engine exhaust using the alcohol/gasoline blends by the following method and to Characterize the aldehyde emis...

Implementation of UART Using VHDL

UART (Universal Asynchronous Receiver Transmitter) is a kind of serial communication protocol; mostly used for short-distance, low speed, low-cost data exchange between computer and peripherals. During the actual indust...

slugDetermination of Atrial Diastole and Systole from 2-D Echocardiographic Images Using Artificial Neural Network

This project proposes a new approach to estimate the cardiac cycle phases in 2-D echocardiographic images as a first step in cardiac volume estimation. We focused on analyzing the atrial systole and diastole events. The...

Download PDF file
  • EP ID EP19628
  • DOI -
  • Views 328
  • Downloads 5

How To Cite

vijayaTushar Gaikwad, Mayur Patil, Prof. Vijaya Sagvekar, Prof. Divya Racha (2015). Network Security: A Study Using Cryptography Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(2), -. https://europub.co.uk/articles/-A-19628