Providing Information Security Using Public Key Cryptosystems
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 3
Abstract
Information security is main issue of this generation of computing because many types of attacks such as passive and active are increasing day by day. Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction, denial of message. It is a general term that can be used regardless of the form the data may providing confidentiality, integrity, and availability of information is is at the heart of information security to provide all these things in this paper we proposed public key cryptosystems. Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic protocols based on algorithms that require two separate keys , one of which is secret (or private) and one of which is public. To provide confidentiality, integrity, and availability of information we are using public key cryptosystems such as RSA algorithm, Elliptic curve cryptography, Diffie-Hellman key exchange algorithm and Digital Signatures
Authors and Affiliations
Mr D. Shiva rama krishna, Mr K. Siva Rama Prasad, Mr Ch. v. v. Narasimha Raju
Recognizing Sentiment Prediction on Twitter Data
Escorted by the wide spread of Internet today, people have found a new way of expressing their opinions. It is a platform with a variety of information where an individual can also view the opinions of others. This is co...
Kidney Tumour Detection Using Deep Neural Network
Classifying the malignancy of a renal tumour is one of the most important urological duties because it plays a key role in determining whether or not to undergo kidney removal surgery (nephrectomy). Currently, the radiol...
Adoption of Cloud Computing Framework in Higher Education to Enhance Educational Process
Cloud Computing (CC) becames the most promising technology to reach the advanced educational services, because it essentially provides a huge computing and storage capacities. Cloud computing provides reliable and tailor...
Comparative Study and Utilization of Best Deep Learning Algorithms for the Image Processing
Deep learning has gained immense popularity in scientific computing, and its algorithms are widely used in complex problem-solving industries. Every deep learning algorithm use different types of neural networks to perfo...
Data Mining: Using C++ to Measure Correlation between Real Valued and Nominal Valued datasets
In vast databases, there are various fields of mixed data types such as real, nominal and ordinal etc. In data mining applications, to know the relationship among data sets is an important issue. A correlation is commonl...