CRYPTOGRAPHIC TECHNIQUE FOR COMMUNICATION SYSTEM

نویسندگان

چکیده

In Today’s world Sensitive data is increasingly used in communication over the internet. Thus Security of biggest concern internet users. Best solution use some cryptography algorithm which encrypts cipher and transfers it again decrypted to original data. The field deals with procedure for conveying information securely. Cryptography includes a set techniques scrambling or disguising so that available only someone who can restore its form. by using secret code was Egyptians 4000 years ago. However, science initiated Arabs since 600s. becomes vital twentieth century where played crucial role World War I 2. This paper focuses on analysis two types key exists, based availability publicly: Private Cryptography, Public Key Cryptography. Both sender recipient share must be kept private.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Calculus of Cryptographic Communication

We define C, a model-based formalism that is one half of a whole framework for the modelling, specification, and verification of cryptographic protocols. C consists of a language of distributed processes and an associated (SOS) notion of concurrent execution. The other, co-designed, half of our framework is a property-based formalism, i.e., a logic, for the specification and verification of suc...

متن کامل

A cryptographic watermarking technique for multimedia signals

Digital watermarking has been widely used in digital rights management and copyright protection. In this paper, new cryptographic watermark schemes are proposed. Compare to the existing watermarking techniques, our proposed watermark schemes combine both security and efficiency that none of the existing schemes can do. We first develop an algorithm to randomly generate the watermark indices bas...

متن کامل

All-Optical Cryptographic Device for Secure Communication

An all-optical cryptographic device for secure communication, based on the properties of soliton beams, is presented. It can encode a given bit stream of optical pulses, changing their phase and their amplitude as a function of an encryption serial key that merge with the data stream, generating a ciphered stream. The greatest advantage of the device is real-time encrypting – data can be transm...

متن کامل

Quantum Cryptographic Protocols for Secure Communication

Quantum Cryptography offers a secure method of sharing sequences of random numbers to be used as cryptographic keys. It can potentially eliminate many of the weaknesses of classical cryptographic methods. In this paper, we survey some results in quantum cryptography. After a brief introduction to classical cryptography, some fundamental quantum key distribution protocols are reviewed. The issue...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Scientific Journal Of Research In Engineering And Management

سال: 2022

ISSN: ['2582-3930']

DOI: https://doi.org/10.55041/ijsrem11460