Optimal Cryptographic Technique to increase the Data Security

Abstract

There are many aspects to security ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of secret key Cryptography. It is the automated method in which security goals are accomplished. It includes the process of encryption that converts plain-text into cipher-text. The process of decryption reconverts the cipher-text into plain-text. Secure communication is the prime requirement of every organization. To achieve this, one can use many techniques or algorithms available for Cryptography. In this context, we analyze and implement extremely protected cryptography scheme using the properties of quaternion which is the extension of the complex numbers and Farey fractions, Farey sequence of order n is the sequence of completely reduced fractions between 0 and 1. The proposed techniques in this paper can help in increasing the accurateness and wholeness of network topology discovery and can control existing protocol and hardware features, and also can be implemented easily.

Authors and Affiliations

K Laxmi Narayan| Assistant Professor, Department of ECE, Kodaikanal Institute of Technology Machur, Kodaikanal, India, S Jafar Ali Ibrahim| Assistant Professor, Dept of IT Kodaikanal Institute of Technology Machur, Kodaikanal, India

Keywords

Related Articles

Sclera Feature Extraction for Personal Authentication

This paper presents sclera-based biometric recognition. The vessel patterns in sclera are different for every individual and this can be used to identify a person uniquely. In this analysis , we are using sobal filter...

Dielectric Superstrate Thickness Varying on the Characteristics of Square Patch Antenna

This paper focused on the coaxial probe fed square patch microstrip antenna characteristics have been studied with and without dielectric Superstrates. The dielectric constant of the substrate and Superstrate material is...

Analysis of Burst Assembly Modeling for Optical Burst Switched Network

In this paper, we have study the current state of the technology, the Optical burst Switched (OBS) network is the most practical in all-optical architecture. Here we define how Burst Assembly will carried out and also he...

Artifacts Correction in MRI Imaging Using RF Pulse Phase Modulation and Recurrence Solving

Currently MRI is extensively used in medical analysis to produce high-eminence images for its a variety of useful features, such as high-resolution potential, subjective anatomic cross-sectional image, and high tissue...

User Driven Feedback Control System driven using CAN Protocol

Industrial automation is a sector having vast possibilities for major improvements. The system described in this paper consists of a console master computer (CMC) which will monitor various physical nodes usually found i...

Download PDF file
  • EP ID EP8347
  • DOI -
  • Views 375
  • Downloads 24

How To Cite

K Laxmi Narayan, S Jafar Ali Ibrahim (2013). Optimal Cryptographic Technique to increase the Data Security. International Journal of Electronics Communication and Computer Technology, 3(2), 398-402. https://europub.co.uk/articles/-A-8347