Volume- 3
Issue- 3
Year- 2015
Mr D.Shiva rama krishna , Mr K.Siva Rama Prasad, Mr Ch.v.v.Narasimha Raju
Information security is main issue of this generation of computing because many types of attacks such as passive and active are increasing day by day. Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction, denial of message. It is a general term that can be used regardless of the form the data may providing confidentiality, integrity, and availability of information is is at the heart of information security to provide all these things in this paper we proposed public key cryptosystems. Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic protocols based on algorithms that require two separate keys , one of which is secret (or private) and one of which is public. To provide confidentiality, integrity, and availability of information we are using public key cryptosystems such as RSA algorithm, Elliptic curve cryptography, Diffie-Hellman key exchange algorithm and Digital Signatures
[1] V.Kavitha & K.S Easwarakumar, (2008) “Enhancing Privacy in Arithmetic Coding” ICGSTAIML journal, Volume 8, Issue I.
[2] J.A Storer, (1988) “Data Compression: Methods and Theory” Computer Science Press. Dr. V.K. Govindan & B.S. Shajee mohan “An intelligent text data encryption and compression for high speed and secure data transmission over internet”
[3] Di_e, W., and Hellman, M. New directions in cryptography. IEEE Trans. Inform. Theory IT-22, (Nov. 1976), 644-654.
[4] Di_e, W., and Hellman, M. Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10 (June 1977), 74-84.
[5] D. Djenouri, L. Khelladi, “A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks,” IEEE Communication Surveys and Tutorials, vol. 7, no. 4, pp. 2–28, December 2005.
[6] G. Gaubatz, J-P. Kaps, B. Sunar, “Public Key Cryptography in Sensor Networks Revisited”, 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science, vol. 3313, Springer, Heidelberg, pp. 2-18, August, 2004.
[7] A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, “SPINS: R. Lehtinen, (2006), “Computer Security Basics”, 2nd Edition, O'Reilly, ISBN-10: 0-596-00669-1.
[8]Shobhalokhande,Dipalisawant,NazneenSayyad,MamataYeng ul,” E-Voting through Biometrics and CryptographySteganography Technique with conjunction of GSM Modem”, Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012)Proceedings published in International Journal of Computer Applications® (IJCA).
[9] William Stallings,”Cryptography and Network Security, Principles and Practices”, Third Edition, pp. 67-68 and 317-375, Prentice Hall, 2003.
[10] T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach, “Analysis of an Electronic Voting System,” Security and Privacy, IEEE Symposium on, vol. 0, p. 27, 2004.
[11] Crypttography and Nettwork SecuriittyFiifftth Ediittiion by Wiilllliiam Sttalllliings Lectture slliides by Lawriie Brown
[12] A. J. Menezes, P. C. van Oorschot and S. A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, Boca Raton, 1997.
[13] B. A. Forouzan, “Cryptography and Network Security”, McGraw Hill, Boston, 2008.
Computer Science and Engineering, MLR Institute of Technology & management, Hyderabad, India, 9492673201., (e-mail: shivaramakrishna.devalla@mlritm.ac.in).
No. of Downloads: 3 | No. of Views: 1743
Manali Shukla, Ishika Goyal, Bhavya Gupta, Jhanvi Sharma.
July 2024 - Vol 12, Issue 4
Dipti Prajapati, Samishtarani Sabat, Sanika Bhilare, Rashmi Vishe, Prof. Suman Bhujbal.
March 2024 - Vol 12, Issue 2
Anu Sharma, Vivek Kumar.
May 2023 - Vol 11, Issue 3