CFP last date
22 April 2024
Reseach Article

To Secure and Compress the Message on Local Area Network

by Gagandeep Shahi, Charanjit Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 17
Year of Publication: 2013
Authors: Gagandeep Shahi, Charanjit Singh
10.5120/12067-8263

Gagandeep Shahi, Charanjit Singh . To Secure and Compress the Message on Local Area Network. International Journal of Computer Applications. 69, 17 ( May 2013), 43-47. DOI=10.5120/12067-8263

@article{ 10.5120/12067-8263,
author = { Gagandeep Shahi, Charanjit Singh },
title = { To Secure and Compress the Message on Local Area Network },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 17 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 43-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number17/12067-8263/ },
doi = { 10.5120/12067-8263 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:30:34.051295+05:30
%A Gagandeep Shahi
%A Charanjit Singh
%T To Secure and Compress the Message on Local Area Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 17
%P 43-47
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the modern world data security is an essential part to inviolability of the crucial facts. Now the days we deal with digital world to perform tasks such as online cash withdraw from bank, cash submission to bank and online payment receive from clients, online payments to our sellers etc. With the ease to get internet connection, we can say that e-business getting at the peak in these days. In these days Common men showing full interest in e-commerce and e-business. They are transmitting their exigence information in the form of conspicuous passwords, decisive data and esteemed information on the insecure network. To prevent these significant facts data security must be there to target such as confidentiality of facts, integrity of facts and availability facts. Fulfillment of these targets done by the Secret writing also called encryption. If we encrypt the data at sender side then we have to decrypt it at receiver side to make that data in original form, this process is called cryptography. In this paper we will discuss the techniques of the cryptography through two network models named as client server and peer to peer. It also seems that if we implement public key cryptography technique with compression using Peer to Peer on Local area network then can secure and fast the communication of the organizations.

References
  1. Dr. Qais Faryadi (2013) "Does Data Security Matter? The Case for Cryptography" The 2nd International Conference on Computer Science & Computational Mathematics (ICCSCM).
  2. Megha Ojha, Priyank Dubey (2013) "Sharing of Encrypted Information in a Network Using Block Cipher Cryptography" International Journal of Emerging Technology and Advanced Engineering ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1.
  3. Rupinder Singh Brar, Bikramjeet singh (2013) "A Survey on Different Compression Techniques and Bit Reduction Algorithm for Compression of Text/Lossless Data" International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3.
  4. Abhijit A. Sawant, Dr. B. B. Meshram (2013) " Network programming in Java using Socket" International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, Vol. 3, Issue 1, January -February 2013, pp.
  5. Shaik Rabbani, Rakesh Nayak, Dr. J. Pradhan (2013) "An NTRU Scheme for Secure Transaction in Grid Implementation" International Journal of Emerging Technology and Advanced Engineering ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2.
  6. Pawandeep Singh Aujla, Harneet Arora (2013) "A Secure Account based Mobile Payment Protocol with Public Key Cryptography and Biometric Characteristics" International Journal of Science and Research (IJSR), India Online ISSN: 2319?7064.
  7. Raj Kumar, Naveen Kumar, Chandra Sekhar P, Bhargav Nunna, Vinod Kumar B (2012) "International Journal of Computer Science and Network (IJCSN)" Volume 1, Issue 4, August 2012, ISSN 2277-5420.
  8. Sameer Hasan Al-Bakri1, M. L. Mat Kiah, A. A. Zaidan, B. B. Zaidan and Gazi Mahabubul Alam (2012) "Securing peer-to-peer mobile communications using public key cryptography: New security strategy" International Journal of the Physical Sciences Vol. 6(4), pp. 930-938, 18 .
  9. Monika Agrawal, Pradeep Mishra (2012) "A Comparative Survey on Symmetric Key Encryption Techniques" International Journal on Computer Science and Engineering (IJCSE).
  10. A. Medani, A. Gani, O. Zakaria, A. A. Zaidan, B. B. Zaida (2011) "Review of mobile short message service security issues and techniques towards the solution" Scientific Research and Essays Vol. 6(6), pp. 1147-1165.
  11. E. Thumbiraja, G. Ramesh, Dr. R. Umarani (2012) "A Survey on Various Most Common Encryption Techniques" International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 7, July 2012 ISSN: 2277 128X
  12. Sachin Upadhyay (2011) "Attack on RSA Cryptosystem" International Journal of Scientific & Engineering Research Volume 2, Issue 9, ISSN 2229-5518
  13. Mohammed Abutaha, Mousa Farajallah, Radwan Tahboub & Mohammad Odeh (2011) "Survey Paper: Cryptography Is The Science Of Information Security" International Journal of Computer Science and Security (IJCSS), Volume (5): Issue (3).
Index Terms

Computer Science
Information Sciences

Keywords

RSA NTRU Digital Signature P2P LAN