Object Oriented Modelling of Idea using GA based efficient key generation for e-governance security (OOMIG)

نویسندگان

  • Arindam Sarkar
  • S. Karforma
  • J. K. Mandal
چکیده

Nowadays different state and central government in India as well as abroad are taking initiative to deliver different kind of services electronically specially using Information and Communication Technology (ICT). Intruders or hackers can steal or modify the information communicated between Government and consumer through internet. To implement privacy and confidentiality of the information we must use suitable encryption technique. In this paper an Object Oriented Modelling of International Data Encryption Algorithm (IDEA) using GA based efficient key generation technique has been proposed to incorporate privacy and confidentiality of information which would be communicated between government and consumer.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

An Efficient Genetic Agorithm for Solving the Multi-Mode Resource-Constrained Project Scheduling Problem Based on Random Key Representation

In this paper, a new genetic algorithm (GA) is presented for solving the multi-mode resource-constrained project scheduling problem (MRCPSP) with minimization of project makespan as the objective subject to resource and precedence constraints. A random key and the related mode list (ML) representation scheme are used as encoding schemes and the multi-mode serial schedule generation scheme (MSSG...

متن کامل

Designing an E-Government Model in the Ethical Framework of Good Governance

Background: Good governance within the framework of ethics is active and constructive cooperation between government and citizens, and the key to its success lies in the ethical behavior of the participating powers in political management. The success of e-government requires elements of good governance based on ethics. To realize e-government, we need good ethical governance indicators. Theref...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1204.1797  شماره 

صفحات  -

تاریخ انتشار 2012