CFP last date
20 May 2024
Reseach Article

S2SE: An Encryption Methodology

Published on December 2013 by N. Kanagaraj, A. Padmapriya
International Conference on Computing and information Technology 2013
Foundation of Computer Science USA
IC2IT - Number 2
December 2013
Authors: N. Kanagaraj, A. Padmapriya
80b59dcc-ecdc-4a46-92b8-fe71a5b660d5

N. Kanagaraj, A. Padmapriya . S2SE: An Encryption Methodology. International Conference on Computing and information Technology 2013. IC2IT, 2 (December 2013), 13-15.

@article{
author = { N. Kanagaraj, A. Padmapriya },
title = { S2SE: An Encryption Methodology },
journal = { International Conference on Computing and information Technology 2013 },
issue_date = { December 2013 },
volume = { IC2IT },
number = { 2 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 13-15 },
numpages = 3,
url = { /proceedings/ic2it/number2/14394-1324/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Computing and information Technology 2013
%A N. Kanagaraj
%A A. Padmapriya
%T S2SE: An Encryption Methodology
%J International Conference on Computing and information Technology 2013
%@ 0975-8887
%V IC2IT
%N 2
%P 13-15
%D 2013
%I International Journal of Computer Applications
Abstract

In the day to day life, Internet has become a vital part, owing to the revolutionary changes it has brought about in various fields. Transfer of critical information is also being carried out through the Internet. This enormous use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for information security [3]. A security mechanism is any process that is designed to prevent, detect, or recover from a security attack. Examples of this security mechanism are encryption algorithms, authentication protocols and digital signatures. Encryption algorithms are used to protect blocks of data, such as messages from alteration. In this paper, we introduced a simple encryption methodology to secure the text file for longer time.

References
  1. Cryptography and Network Security - Principles and Practice, Fifth edition, William Stallings, Pearson Publication.
  2. http://msdn. microsoft. com/en-us/library/ff650720. aspx - Symmetric and Asymmetric encryption process figures.
  3. Sheena, Mathew; Dr. Poulose Jacob, K, Studies,Design and Development of Network Security Enhancement Services Using Novel Cryptographic Algorithms , Dtd: 2008-06. Online available at http://dyuthi. cusat. ac. in/purl/2689
  4. Online available at: http://en. kryptotel. net/encryption. html
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Encryption Decryption Network Security Symmetric Encryption