The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
3C consist of three terms a. Cryptography b. Cascade c. Customized In brief It protects data from being viewed or modified and provides a secure means of communication over insecure channels by encrypting data multiple time using different algorithms selected by users as per their need. Thus key size and cipher text size will increase which leads to more security rather than regular, single algorithm.
DNA computing is the back bone of the DNA cryptography. DNA cryptography is becoming an alternative to the traditional cryptographic approach that exists in our day-today life. In spite security breaches overwhelm the traditional security techniques that are provided to a system. Thus, to increase the security feature with less cost and reduced computational time, we go for techniques utilizing the...
In this paper we introduce an approach which is more secure than original RSA algorithm, which is used for digital signatures and encryption in public key cryptography. This approach eliminates the need to transfer n, the product of two random but essentially big prime numbers, in the public key due to which it becomes difficult for the intruder to guess the factors of n and hence the encrypted message...
In this paper we are proposing a technique for secret communication between Alice and Bob. We are using both cryptography and steganography. Firstly, we encrypt the secret message using our new cipher algorithm called twelve square substitution cipher algorithm, and then embed the cipher text in the carrier image in 6th and 7th bit locations or 7th and 8th bit locations or 6 and 8 bit locations of...
Symmetric key algorithms are a typically efficient and fast cryptosystem, so it has significant applications in many realms. For a wireless ad hoc network with constraint computational resources, the cryptosystem based on symmetric key algorithms is extremely suitable for such an agile and dynamic environment, along with other security strategies. In this paper, we introduce the concept of selective...
In this paper, a generalized Fibonacci matrix and a pq-generalized Fibonacci matrix are proposed and their construction methods are obtained. As an application, an encryption/decryption algorithm based on pq-generalized Fibonacci matrix is also proposed. The algorithm permits large key amount and has verification capability.
In this paper we present a technique for secure communication between two parties Alice and Bob. We use both cryptography and image steganography. We encrypt the secret message by using a new cipher which is extended from Hill cipher. Then the cipher text of the secret message is embedded into the carrier image in 6th, 7th and 8th bit locations of the darkest and brightest pixels. Here 8th bit means...
Typically encryption follows a specific rule with or without a key so that the cipher text can be decoded using the corresponding suitable decryption algorithm. This paper aims at removing the need for the encoding to follow a general rule by using a neural network for decoding the cipher text. Hence introducing the randomness in coding making it so much more difficult to decode. We have also introduced...
On Internet, securing email has always been an important issue. Various standards and products have been created. There are very rare Web services provide the encryption to emails for security purposes. Data compression in email is not broadly introduced, by generating code book like telegraphic code book, text message could compress up to 35% to 45%. By using programming techniques it is very easy...
In this paper a session key based encryption system has been proposed and termed as "Session Key Based Manipulated Iteration Encryption Technique (SKBMIET)". A Key is created from the input. Generating different randomized Matrices forms the Key. The value of the generated is manipulated with the individual ASCII values of the plain text. After completion of this process all the different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.