AN APPROACH TO REVAMP THE DATA SECURITY USING CRYPTOGRAPHIC TECHNIQUES
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
. SuyashVerma, RajnishChoubey, Roopalisoni “An Efficient Developed New Symmetric Key Cryptography Algorithm for Information Security†International Journal of Emerging Technology and Advanced Engineering Volume 2, Issue 7, July 2012.
. S. Castano, M. Fugini, G. Martella, and P. Samarati, Database Security, Addison-Wesley, 1995.
. Dr. L. Arockiam, S. Monikandan, “AROcrypt: A Confidentiality Technique for Securing Enterprise’s Data in Cloudâ€, International Journal of Engineering and Technology, ISSN: 0975-4024, Volume 7, Issue 1, February-March 2015, pp. 245-253.
. Wuling Ren, "A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communicationâ€, Second International Conference on Modeling", Simulation and Visualization Methods (WMSVM), 2010.
. Grabbe J, Data Encryption Standard: The Triple DES algorithm illustrated Laissez faire city time, Volume: 2, No. 28, and 2003.
. Chih-Pin Su, Tsung-Fu Lin, Chih-Tsun Huang, and Cheng-Wen Wu, National Tsing Hua University,†A high throughput low cost AES processor†IEEE Communications Magazine 0163-6804/03 2003 IEEE.
. Nithin Nagaraj, “Short communication One-Time Pad as a nonlinear dynamical system†Amrita Vishwa Vidyapeetham, Amritapuri Campus, India, Elsevier
. Aman Kumar, Dr. Sudesh Jakhar and Mr. Sunil Makkar, "Comparative Analysis between DES and RSA Algorithm’s", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, pp. 386-391, July 2012.
. Xin Zhou and Xiaofei Tang, "Research and Implementation of RSA Algorithm for Encryption and Decryption", the 6th International Forum on Strategic Technology, pp. 1118 – 1121, 2011.
. Simon Blake Wilson et al., “Key agreement protocols and their security analysis,†9-sep- 1997.
. Erfaneh Noorouzil et al, “A New Digital Signature Algorithmâ€, International Conference on Machine Learning and Computing, IPCSIT vol.3, 2011.
. Robert Zuccherato, “Elliptic Curve Cryptography Support in Entrust,†Entrust ltd. in Canada, Dated: 9-may-2000.
. Othman O. Khalifa, “Communication Cryptographyâ€, IEEE transaction on Cryptography, 2004, pp. 1-15.
. Meenakshi Shankar and Akshaya.P, International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014. Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts