Optimal Cryptographic Technique to increase the Data Security
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2013, Vol 3, Issue 2
Abstract
There are many aspects to security ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of secret key Cryptography. It is the automated method in which security goals are accomplished. It includes the process of encryption that converts plain-text into cipher-text. The process of decryption reconverts the cipher-text into plain-text. Secure communication is the prime requirement of every organization. To achieve this, one can use many techniques or algorithms available for Cryptography. In this context, we analyze and implement extremely protected cryptography scheme using the properties of quaternion which is the extension of the complex numbers and Farey fractions, Farey sequence of order n is the sequence of completely reduced fractions between 0 and 1. The proposed techniques in this paper can help in increasing the accurateness and wholeness of network topology discovery and can control existing protocol and hardware features, and also can be implemented easily.
Authors and Affiliations
K Laxmi Narayan| Assistant Professor, Department of ECE, Kodaikanal Institute of Technology Machur, Kodaikanal, India, S Jafar Ali Ibrahim| Assistant Professor, Dept of IT Kodaikanal Institute of Technology Machur, Kodaikanal, India
Sclera Feature Extraction for Personal Authentication
This paper presents sclera-based biometric recognition. The vessel patterns in sclera are different for every individual and this can be used to identify a person uniquely. In this analysis , we are using sobal filter...
Dielectric Superstrate Thickness Varying on the Characteristics of Square Patch Antenna
This paper focused on the coaxial probe fed square patch microstrip antenna characteristics have been studied with and without dielectric Superstrates. The dielectric constant of the substrate and Superstrate material is...
Analysis of Burst Assembly Modeling for Optical Burst Switched Network
In this paper, we have study the current state of the technology, the Optical burst Switched (OBS) network is the most practical in all-optical architecture. Here we define how Burst Assembly will carried out and also he...
Artifacts Correction in MRI Imaging Using RF Pulse Phase Modulation and Recurrence Solving
Currently MRI is extensively used in medical analysis to produce high-eminence images for its a variety of useful features, such as high-resolution potential, subjective anatomic cross-sectional image, and high tissue...
User Driven Feedback Control System driven using CAN Protocol
Industrial automation is a sector having vast possibilities for major improvements. The system described in this paper consists of a console master computer (CMC) which will monitor various physical nodes usually found i...