Saravanan et al., 2018 - Google Patents
A Review Paper on Cryptography-Science of Secure CommunicationSaravanan et al., 2018
View PDF- Document ID
- 2233554020310975086
- Author
- Saravanan T
- Kumar S
- Publication year
- Publication venue
- Int. J. of Comp. Sci. Trends and Tech
External Links
Snippet
Cryptography is the technique of using mathematical algorithms to encryption and decryption the information. Store data or transfer it across unconfident networks [like the Internet] so that it cannot be view by anyone except the intended recipient. While …
- 238000004891 communication 0 title description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sahu et al. | Securing messages from brute force attack by combined approach of honey encryption and blowfish | |
Gafsi et al. | High securing cryptography system for digital image transmission | |
Khatarkar et al. | A survey and performance analysis of various RSA based encryption techniques | |
Chaloop et al. | Enhancing hybrid security approach using AES and RSA algorithms | |
Godara et al. | An improved algorithmic implementation of rail fence cipher | |
Sharma et al. | Cryptography using blowfish algorithm | |
Bastanta et al. | Image data encryption using DES method | |
Erondu et al. | An encryption and decryption model for data security using vigenere with advanced encryption standard | |
Manikandaprabhu et al. | A review of encryption and decryption of text using the AES algorithm | |
Shirole et al. | Review paper on data security in cloud computing environment | |
Abusukhon et al. | Analyzing the efficiency of Text-to-Image encryption algorithm | |
Saravanan et al. | A Review Paper on Cryptography-Science of Secure Communication | |
Phatangare et al. | Multi-Level Encryption System using AES and RSA Algorithms | |
Kaur et al. | Cryptography in cloud computing | |
Gayathri et al. | Study: Cryptography for information security | |
Sharma et al. | Taxonomy of cryptography techniques for network security | |
Kumar et al. | Web Application Security on Top of Public Cloud | |
Chisoni et al. | The Design and Implementation of a Secure File Storage on the Cloud using Hybrid Cryptography | |
Diwan et al. | An approach to revamp the data security using cryptographic techniques | |
AlSideiri et al. | Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System | |
Memon et al. | Randomized text encryption: A new dimension in cryptography | |
Mutabaruka | Enhancing Data Security by Using Hybrid Encryption Technique (Advanced Encryption Standard and Rivest Shamir Adleman) | |
Pawar et al. | Survey of cryptography techniques for data security | |
Rawal et al. | Cryptography: Symmetric vs Asymmetric Encryption | |
Chaudhari et al. | A survey on methods of cryptography and data encryption |