Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Quality Analysis of Network Security using Cryptographic Techniques

Print
PDF
IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research
© 2019 by IJCA Journal
ICAIM 2017 - Number 3
Year of Publication: 2019
Authors:
Aniket Dalvi
Charul Dalvi
Rahul Deshmukh

Aniket Dalvi, Charul Dalvi and Rahul Deshmukh. Article: Quality Analysis of Network Security using Cryptographic Techniques. IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research ICAIM 2017(3):22-24, February 2019. Full text available. BibTeX

@article{key:article,
	author = {Aniket Dalvi and Charul Dalvi and Rahul Deshmukh},
	title = {Article: Quality Analysis of Network Security using Cryptographic Techniques},
	journal = {IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research},
	year = {2019},
	volume = {ICAIM 2017},
	number = {3},
	pages = {22-24},
	month = {February},
	note = {Full text available}
}

Abstract

Data or Information security is a testing issue today that requests a strong encryption which is exceptionally hard to break. System Security is the most fundamental part in data security in light of the fact that it is in charge of securing all data went through organized PCs. A considerable measure of examination has been carried out in cryptography such a large number of specialists have proposed diverse calculations for encryption. Data can be access by unapproved client for insidious reason. In this way, it is critical to actualize successful encryption/decoding calculations for more security. In this paper we have given an extensive mixture of different calculations and systems, for example, Triple DES, BREA, AES, Elliptic Curve Cryptography, CryptoStegnography, Dual RSA, Stream and Block figures, and Quantum Cryptography through which information will be secured. A definite examination is carried out to have an acceptable view about all the methods, nature of every strategy and will examine open key base, really great protection, computerized signature, private key encryption, piece shrewd parallel encryption.

References

  • https://en. wikipedia. org/wiki/Cryptography .
  • https://en. wikipedia. org/wiki/Public- key_cryptography.
  • fttps://www. researchgate. net/publication/283770069_Byte_Rotation_Encryption_Algorithm_through_parallel_processing_and_multi-core_utilization.
  • http://science. howstuffworks. com/science-vs-myth/everyday-myths/quantum-cryptology. html.