Comparison of Various Encryption Algorithms and Techniques for Secured Data Communication in Multinode Network

نویسندگان

  • Ajay Kakkar
  • M. L. Singh
چکیده

For a secured system it has been desired to make the combination of data and keys secured. One can hack the data by knowing the information about the radiations of a machine, key length, encryption time, number of stations and block size. Few algorithms creates dummy file which has been generated along with the encrypted data in order to misguide the hacker and acts as overheads. Short length keys are normally exposed to the hacker very easily that‟s why large key lengths have been preferred. For the encryption and transmission of data in Multinode Network (MN) various techniques are used. This paper covers the various techniques and algorithms used for the data security in MN.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Distribution Scheme for Multinode Network

In order to protect the data from the intruders powerful encryption algorithms with multiple keys has been used over the recent years. Once the encryption process has been done then there is a need to transmit it over the channel. The secured model has been examined on the basis of its design, mode of transmission of data and number of nodes. With increase in number of nodes, key length, number...

متن کامل

Secured Wireless Data Communication

Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of data and new algorithms are evolving. Polyalphabetic sub...

متن کامل

Review on Chaotic Sequences Based Cryptography and Cryptanalysis

This literature review glances at the research that has been published in the area of chaos cryptography along with cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the designing and cryptanalysis of chaotic cryptosystem for the validity of cryptosystems and improvement in encryption techniques. This review analyzes the role tha...

متن کامل

Chip Implementation of Text Encryption and Decryption Algorithms

Cryptography is the science of using mathematics to encrypt and decrypt data. It enables to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. A common goal of cryptographic research i...

متن کامل

Comparison of TACIT Encryption Algorithm with Various Encryption Algorithms

A common goal of cryptographic research is to design protocols that provide a confidential and authenticated transmission channel for messages over an insecure network. A cryptographic algorithm is considered to be computationally secured if it cannot be broken with standard resources, either current or future and apart from the algorithm distribution of keys also more important is to make an e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012