Optimal Cryptographic Technique to increase the Data Security
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2013, Vol 3, Issue 2
Abstract
There are many aspects to security ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of secret key Cryptography. It is the automated method in which security goals are accomplished. It includes the process of encryption that converts plain-text into cipher-text. The process of decryption reconverts the cipher-text into plain-text. Secure communication is the prime requirement of every organization. To achieve this, one can use many techniques or algorithms available for Cryptography. In this context, we analyze and implement extremely protected cryptography scheme using the properties of quaternion which is the extension of the complex numbers and Farey fractions, Farey sequence of order n is the sequence of completely reduced fractions between 0 and 1. The proposed techniques in this paper can help in increasing the accurateness and wholeness of network topology discovery and can control existing protocol and hardware features, and also can be implemented easily.
Authors and Affiliations
K Laxmi Narayan| Assistant Professor, Department of ECE, Kodaikanal Institute of Technology Machur, Kodaikanal, India, S Jafar Ali Ibrahim| Assistant Professor, Dept of IT Kodaikanal Institute of Technology Machur, Kodaikanal, India
Design of Pulse Triggered FlipFlop for Low Power Applications
Most important challenge in modern VLSI design along with area and speed is the power consumption. Flip flop is the basic element in digital system which plays very important role. In this paper, a low power pulse tri...
A Paper On Big Data Survey (Overview Of Big Data)
A collection of facts, such as values or measurements is known to be the data. Whatever the data is present it is to be stored for future reference. To store data we need the use of databases like Oracle etc.; these...
Design a Circular Microstrip Patch Antenna for Dual Band
This paper presents a circular patch microstrip antenna operate in dual band (1.66 GHz and 2.777GHz). The proposed Circular patch antenna will be in light weight, flexible, slim and compact unit compare with current ante...
Achieving MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Discovery
In this work, two scenarios are considered, scenario-1 is key based communication and scenario-2 is priority based routing and communication. In scenario-1, MANET works on generated keys called KEY1 and KEY2 to estab...
Automatic Speed Breaker on Time Demand Using Embedded Systems
The concept of this research work is to have an automatic speed breaker on time demand according to the requirements. Means when there is no need of the speed breaker on the road, it disappears from the road and the road...