[go: up one dir, main page]

Saravanan et al., 2018 - Google Patents

A Review Paper on Cryptography-Science of Secure Communication

Saravanan et al., 2018

View PDF
Document ID
2233554020310975086
Author
Saravanan T
Kumar S
Publication year
Publication venue
Int. J. of Comp. Sci. Trends and Tech

External Links

Snippet

Cryptography is the technique of using mathematical algorithms to encryption and decryption the information. Store data or transfer it across unconfident networks [like the Internet] so that it cannot be view by anyone except the intended recipient. While …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Similar Documents

Publication Publication Date Title
Sahu et al. Securing messages from brute force attack by combined approach of honey encryption and blowfish
Gafsi et al. High securing cryptography system for digital image transmission
Khatarkar et al. A survey and performance analysis of various RSA based encryption techniques
Chaloop et al. Enhancing hybrid security approach using AES and RSA algorithms
Godara et al. An improved algorithmic implementation of rail fence cipher
Sharma et al. Cryptography using blowfish algorithm
Bastanta et al. Image data encryption using DES method
Erondu et al. An encryption and decryption model for data security using vigenere with advanced encryption standard
Manikandaprabhu et al. A review of encryption and decryption of text using the AES algorithm
Shirole et al. Review paper on data security in cloud computing environment
Abusukhon et al. Analyzing the efficiency of Text-to-Image encryption algorithm
Saravanan et al. A Review Paper on Cryptography-Science of Secure Communication
Phatangare et al. Multi-Level Encryption System using AES and RSA Algorithms
Kaur et al. Cryptography in cloud computing
Gayathri et al. Study: Cryptography for information security
Sharma et al. Taxonomy of cryptography techniques for network security
Kumar et al. Web Application Security on Top of Public Cloud
Chisoni et al. The Design and Implementation of a Secure File Storage on the Cloud using Hybrid Cryptography
Diwan et al. An approach to revamp the data security using cryptographic techniques
AlSideiri et al. Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System
Memon et al. Randomized text encryption: A new dimension in cryptography
Mutabaruka Enhancing Data Security by Using Hybrid Encryption Technique (Advanced Encryption Standard and Rivest Shamir Adleman)
Pawar et al. Survey of cryptography techniques for data security
Rawal et al. Cryptography: Symmetric vs Asymmetric Encryption
Chaudhari et al. A survey on methods of cryptography and data encryption