Optimal Cryptographic Technique to increase the Data Security

Abstract

There are many aspects to security ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of secret key Cryptography. It is the automated method in which security goals are accomplished. It includes the process of encryption that converts plain-text into cipher-text. The process of decryption reconverts the cipher-text into plain-text. Secure communication is the prime requirement of every organization. To achieve this, one can use many techniques or algorithms available for Cryptography. In this context, we analyze and implement extremely protected cryptography scheme using the properties of quaternion which is the extension of the complex numbers and Farey fractions, Farey sequence of order n is the sequence of completely reduced fractions between 0 and 1. The proposed techniques in this paper can help in increasing the accurateness and wholeness of network topology discovery and can control existing protocol and hardware features, and also can be implemented easily.

Authors and Affiliations

K Laxmi Narayan| Assistant Professor, Department of ECE, Kodaikanal Institute of Technology Machur, Kodaikanal, India, S Jafar Ali Ibrahim| Assistant Professor, Dept of IT Kodaikanal Institute of Technology Machur, Kodaikanal, India

Keywords

Related Articles

Can Base Patient Monitoring System

This paper deals with CAN technology to sense and transfer the data related to patient health problem. So, efficient medical services can be provided to the patient in appropriate time. The project is working model wh...

License Plate Recognition System based on Image Processing Using Labview

A License plate recognition (LPR) system is one kind of an intelligent transport system and is of considerable interest because of its potential applications in highway electronic toll collection and traffic monitoring s...

Advanced Composite Communication System

Advanced Composite Communication System (ACCS) is the new generation of composite communication systems for on board NAVAL ships. The secret form of communication in between ship to ship can be done from this system. Her...

Wireless Sensor Network for Industrial Process Controlling & Monitoring

There has been tremendous research and developments have been done in wireless networking and technology. Wireless sensor networks implementation on industrial process monitoring and controlling purpose is not new to...

Achieving MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Discovery

In this work, two scenarios are considered, scenario-1 is key based communication and scenario-2 is priority based routing and communication. In scenario-1, MANET works on generated keys called KEY1 and KEY2 to estab...

Download PDF file
  • EP ID EP8347
  • DOI -
  • Views 351
  • Downloads 24

How To Cite

K Laxmi Narayan, S Jafar Ali Ibrahim (2013). Optimal Cryptographic Technique to increase the Data Security. International Journal of Electronics Communication and Computer Technology, 3(2), 398-402. https://europub.co.uk/articles/-A-8347