This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
The susceptible nature of information against forthcoming threats has become a ponderous affair for the professionals of this field. It is a result of the rational and steady struggle by the carrying people that has produced multiple approaches which shields vital information from speculated security attacks. For the everyday users who are unfamiliar of these potential incursion(s) to their intimate information, feel helpless when they encounter persecutor(s) who wish to exploit the confidentiality of this elemental information. Here we have discussed about a distinctive approach which deal with these upcoming attacks. We have tried to produce an algorithm which will safeguard users against objectionable invasion of reserved information. We have incorporated a set of diverse techniques to produce an algorithm which is immune to these incursions. These methods interpolate perceptions like Hybrid cryptography [3], R.S.A. algorithm [1], Key management, Hash functions or Encrypted key exchange.
[1] NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav, “Protection of Key in Private Key Cryptography” published by “International Journal of Advanced Research”, Volume 5, Issue 2, Feb 2017.
[2] ArpitAgrawal, GunjanPatankar,”Design of Hybrid Cryptography Algorithm for Secure Communication” published by “International Research Journal of Engineering and Technology”, Volume 3 Issue 1, Jan 2016.
[3] Meenakshi Shankar, Akshay.P, “Hybrid Cryptographic Techniques Using RSA Algorithm and Scheduling Concepts” published by ”International Journal of Network Security & Its Application”, Volume 6, Issue 6, Nov 2014.
Cites this article as
[NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav
(2017), Methods for Protection of Key in Private Key Cryptography, International Journal of Innovative Research in Computer Science & Technology (IJIRCST), Vol-5, Issue-2, Page No-239-241], (ISSN 2347 - 5552). www.ijircst.org
Corresponding Author
NehaTyagi
Assistant Professor, Department of Computer Science & Engineering, G.L. Bajaj Institute of Technology & Management, Greater Noida, Uttar Pradesh, India