Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Secured Wireless Data Communication

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 54 - Number 1
Year of Publication: 2012
Authors:
Dnyanda Namdeo Hire
10.5120/8532-2064

Dnyanda Namdeo Hire. Article: Secured Wireless Data Communication. International Journal of Computer Applications 54(1):27-30, September 2012. Full text available. BibTeX

@article{key:article,
	author = {Dnyanda Namdeo Hire},
	title = {Article: Secured Wireless Data Communication},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {54},
	number = {1},
	pages = {27-30},
	month = {September},
	note = {Full text available}
}

Abstract

Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of data and new algorithms are evolving. Polyalphabetic substitution cipher is a strong algorithm used for security of data in army stations. In this paper, various techniques of security of data and one the algorithm using polyalphabetic substitution cipher are discussed.

References

  • A. S. Tanenbaum, "Computer Networks", 2nd Edition, PHI.
  • http://www. cryptojinas. com-information of cryptography
  • William Stallings, "Cryptography and Network Security", 3rd Edition, Pearson Education.
  • Evangelos Kranakis, "Primality and Cryptography", John Wiley & Sons.
  • Douglas A. Stinson, "Cryptography, Theory and Practice", 2nd Edition, Chapman & Hall, CRC Press Company, Washigton.
  • http://www. truecrypt. org
  • B. B. Edwards Jr. Master Keying by the Numbers (2/e). Security Resources. Pensacola, FL, USA. 1997.
  • B. W. Lampson. "Hints for computer system design. " ACM Operating Systems Rev. 15, 5 (Oct. 1983),pp 33-48.
  • M. W. Tobias. Locks, Safes and Security (2/e). Charles Thomas Publisher, Ltd. Springfield, IL, USA. 2000.
  • J. Andrews. Fundamentals of Master Keying. Associated Locksmiths of America. 1990.
  • Matt Blaze Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks, AT&T Labs – Research, IEEE Security and Privacy, March/April 2003.
  • http://www. freeotfe. org
  • Andrews, M. , and Whittaker, J. "Computer Security. " IEEE Security and Privacy, September/October 2004.
  • National Institute of Standards and Technology. An Introduction to Computer Security: The NIST Handbook. Special Publication 800-12, October 1995.
  • Gardner, M. Codes, Ciphers, and Secret Writing. New York: Dover, 1972.
  • Garrett, P. Making, Breaking Codes: An Introduction to Cryptology. Upper Saddle River, NJ: Practice Hall, 2001.
  • http://www. hpccsystems. com
  • Kahn, D. The Codebreakers: The Story of Secret Writing. New York: Scribner, 1996.
  • Korner, T. The Pleasures of Counting. Cambridge, England: Cambridge University Press, 1996.
  • Kumar, I. Cryptology. Laguna Hills, CA: Aegean Park Press, 1997.
  • Nichols, R. Classical Cryptography Course. Laguna Hills, CA: Aegean Park Press, 1996.
  • Nichols, R. , ed. ICSA Guide to Cryptography. New York: McGraw-Hill, 1999.
  • Sinkov, A. Elementary Cryptanalysis: A Mathematical Approach. Washington, D. C. : The Mathematical Association of America, 1966.
  • http://www. cryptool. com