Book Details

Review of Secure Communication over the Public Network using Modern Techniques

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

At present, it can be said that data technology is developing quite quickly, especially with the widespread use of the Internet. As a result, one of the major problems we currently face is the security of organizational communications. This paper aims to address the problems with the security information encryption computations used by the current organization. We explore the effects of various encryption techniques on advancing organizational security, starting with the PC network correspondence security information encryption calculation. The analysis' findings demonstrate that it is understood that using a connection encryption calculation together with a network's correspondence security calculation can increase security. The start-to-finish encryption computation can enhance the security of digital transactions. The RSA and DES calculations are two extremely agent calculations; they address different encryption frameworks. According to the viewpoint of organization, information connect, three techniques are combined encryption calculation, hub encryption calculation, and start-to-finish encryption calculation.

References

[1] Mitali, Kumar Manoj, Sharma Arvind, "A Survey in various cryptography techniques", IJETTCS, volume 3, Issues 4, July August 2014, ISSN2278-6856.

[2] Ritu Tripathi, Sanjay Agrawal, "Comparative Study of Symmetric and Asymmetric Cryptography Techniques", International Journal of Advance Foundation and Research in Computer (IJAFRC), volume 1, issue 6, June 2014, ISSN 2348 – 4853.

[3] Apoorva, Yogesh Kumar," Comparative Study of Different Symmetric Key Cryptography Algorithms", International Journal of Application or Innovation in Engineering

[4] & Management (IJAIEM),volume 2,issue 7,July 2013, ISSN 2319 –4847.

[5] Mohit Marwaha, Rajeev Bedi, Amritpal Singh, Tejinder Singh "Comparative Analysis of Cryptographic Algorithms", International Journal of Advanced Engineering Technology, EISSN 0976-3945.

[6] Ms Ankita Umale, Ms Priyanka Fulare, "Comparative Study of Symmetric Encryption techniques for Mobile Data Caching in WMN", The InternationalJournal Of Engineering And Science (IJES).

[7] Monika Agrawal, Pradeep Mishra," A Comparative Survey on Symmetric Key Encryption Techniques", International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, PP877-882.

[8] An overview of Cryptography www.graykessler.net/library/crypto.html.

[9] What is symmetric Key Cryptography? Webopedia http://www.webopedia.com/terms/symmetric-keycryptography.html.

[10] Symmetric-key -HowStuffWorks htttp://computer.howstuffwork.com/encryption2.htm.
       M. Kumar and E. G. Dharma, "A comparative analysis of symmetric key encryption algorithm", IJARCET, vol. 3, no. 2, (2014).

[11] O.P Verma, RituAgarwal, DhirajDafouti and ShobhaTyagi, "Performance Analysis of Data Encryption Algorithms", IEEE Delhi Technological University, India, 2011.

[12] Brown Lawrie, Steflik Dick, "Symmetric Encryption Algorithm", CS-480b, Lecture slide (ppt).

[13] MajdiAl-qdah& Lin Yi Hui "simple Encryption/Decryption Application" published in

[14] International Journal of computer science and security, volume(1): Issues(1).

[15] Cryptanalysis of a computer cryptography scheme based on a filter bank David Arroyo a,_, Chengqing Li b, Shujun Li c and Gonzalo Alvarez.

[16] Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm David Arroyo a,∗, Chengqing Li b, Shujun Li c, Gonzalo Alvarez a and Wolfgang A. Halang c.

[17] 18Oracevic, A., Dilek, S., & Özdemir, S. (2017). Security in Internet of things: A survey. 2017 International Symposium on Networks, Computers and Communications (ISNCC), (June), 1--6.

[18] Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of Security and Privacy Issues of Internet of Things. arXiv Preprint arXiv:1501.02211, 7. Retrieved from http://arxiv.org/abs/1501.02211.

[19] Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the Internet of things: A review. Proceedings - 2012 International Conference on Computer Science and Electronics Engineering, ICCSEE 2012, 3, 648--651.

[20] Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani, "New Comparative Study Between DES, 3DES and AES within Nine Factors", Journal Of Computing, ISSN 2151-9617.

Keywords

Image
  • Format Volume 10, Issue 2, No 7, 2022
  • Copyright All Rights Reserved ©2022
  • Year of Publication 2022
  • Author Dr. Ramesh Palanisamy, Rehab Khameis Shanan AL-Zuwaydi, Manal Mohammed Humaid Al aamri
  • Reference IJCS-454
  • Page No 3079-3085

Copyright 2024 SK Research Group of Companies. All Rights Reserved.