Aniket Dalvi, Charul Dalvi and Rahul Deshmukh. Article: Quality Analysis of Network Security using Cryptographic Techniques. IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research ICAIM 2017(3):22-24, February 2019. Full text available. BibTeX
@article{key:article, author = {Aniket Dalvi and Charul Dalvi and Rahul Deshmukh}, title = {Article: Quality Analysis of Network Security using Cryptographic Techniques}, journal = {IJCA Proceedings on Leveraging Information Technology for Inter-Sectoral Research}, year = {2019}, volume = {ICAIM 2017}, number = {3}, pages = {22-24}, month = {February}, note = {Full text available} }
Abstract
Data or Information security is a testing issue today that requests a strong encryption which is exceptionally hard to break. System Security is the most fundamental part in data security in light of the fact that it is in charge of securing all data went through organized PCs. A considerable measure of examination has been carried out in cryptography such a large number of specialists have proposed diverse calculations for encryption. Data can be access by unapproved client for insidious reason. In this way, it is critical to actualize successful encryption/decoding calculations for more security. In this paper we have given an extensive mixture of different calculations and systems, for example, Triple DES, BREA, AES, Elliptic Curve Cryptography, CryptoStegnography, Dual RSA, Stream and Block figures, and Quantum Cryptography through which information will be secured. A definite examination is carried out to have an acceptable view about all the methods, nature of every strategy and will examine open key base, really great protection, computerized signature, private key encryption, piece shrewd parallel encryption.
References
- https://en. wikipedia. org/wiki/Cryptography .
- https://en. wikipedia. org/wiki/Public- key_cryptography.
- fttps://www. researchgate. net/publication/283770069_Byte_Rotation_Encryption_Algorithm_through_parallel_processing_and_multi-core_utilization.
- http://science. howstuffworks. com/science-vs-myth/everyday-myths/quantum-cryptology. html.