A Novel Technique for Secure Communication in Cryptography
نویسندگان
چکیده
منابع مشابه
A Novel Chaotic Encryption Technique for Secure Communication
In this work, a novel chaotic encryption technique is proposed to realize a secure communication system. In the proposed method, the message signal to be transmitted is first encrypted using a chaotic keystream and then masked with a chaotic signal. At the receiver end, the received chaotic signal is used for synchronization and to recover the encrypted signal. After applying the same keystream...
متن کاملA Secure & Verifiable Technique for Secure Communication using Elliptic Curve
During the transmission of data from sender prevents from various attacks. Public key encryption is a technique which provides encryption of data using public key. The existing technique implemented for the searching of keywords with public key encryption provides security from password Guessing attacks [1]. But the technique implemented here enables security from various attacks as fine as als...
متن کاملDecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the Cloud, share a large amount of data day by day. Secure Data sharing is an important issue over the cloud environment. In order to enhance the security services, the paper proposes Decentralized Cryptography Technique for Secure Communication over the Clouds. In this p...
متن کاملQuantum Cryptography for Secure Communication in IEEE 802.11 Wireless Networks
IEEE 802.11 is the Wireless Local Area Networks (WLAN) standard developed by the IEEE LAN/MAN Standards Committee. WLANs are increasingly deployed by businesses, government and SOHO users as they offer many advantages to customers with mobility, flexibility and convenience. Wi-Fi is a trademark of the Wi-Fi Alliance that has been used with certified products that belong to a class of WLANs base...
متن کاملSecure Authentication through a near Field Communication in Asymmetric Cryptography
This paper presents the design and implementation of a complete near-field communication (NFC) tag system that supports highsecurity features. The tag design contains all hardware modules required for a practical realization, which are: an analog 13.56-MHz radio-frequency identification (RFID) front-end, a digital part that includes a tiny (programmable) 8-b microcontroller, a framing logic for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2017
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2017.6374