Книга: Ramkrishna Das and Saurabh Dutta «An Approach to Develop Efficient Private Key Encryption Techniques»

An Approach to Develop Efficient Private Key Encryption Techniques

Производитель: "LAP Lambert Academic Publishing"

Private Key cryptography is a cryptographic system that uses the same secret key to encrypt and decrypt messages. The problem with this method is transmitting the secret private key to the person that needs it without it being intercepted. So, we have focused on the secret procedure to retrieve secret value from the private key rather than securing the actual private key value. Encryption is done in bit level and simple XOR operation is used block wise in several level for encryption. Multiple operators and Nth even or odd term from ASCII representation based scheme increases the security as operators combination and ASCII representation are different in respect of the user choice and the plaintext respectively. A new idea is Implemented where the Nth even or odd term are being calculated from the even and odd bit position of the plaintext. Armstrong or Perfect number with base value scheme with ordering sequence provide a great security as the infinitive numbers of Armstrong or Perfect... ISBN:9783659473760

Издательство: "LAP Lambert Academic Publishing" (2013)

ISBN: 9783659473760

См. также в других словарях:

  • Clandestine HUMINT operational techniques — The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called tradecraft . It applies to clandestine… …   Wikipedia

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Law, Crime, and Law Enforcement — ▪ 2006 Introduction Trials of former heads of state, U.S. Supreme Court rulings on eminent domain and the death penalty, and high profile cases against former executives of large corporations were leading legal and criminal issues in 2005.… …   Universalium

  • Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… …   Wikipedia

  • Business and Industry Review — ▪ 1999 Introduction Overview        Annual Average Rates of Growth of Manufacturing Output, 1980 97, Table Pattern of Output, 1994 97, Table Index Numbers of Production, Employment, and Productivity in Manufacturing Industries, Table (For Annual… …   Universalium

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»