Optimal Cryptographic Technique to increase the Data Security
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2013, Vol 3, Issue 2
Abstract
There are many aspects to security ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of secret key Cryptography. It is the automated method in which security goals are accomplished. It includes the process of encryption that converts plain-text into cipher-text. The process of decryption reconverts the cipher-text into plain-text. Secure communication is the prime requirement of every organization. To achieve this, one can use many techniques or algorithms available for Cryptography. In this context, we analyze and implement extremely protected cryptography scheme using the properties of quaternion which is the extension of the complex numbers and Farey fractions, Farey sequence of order n is the sequence of completely reduced fractions between 0 and 1. The proposed techniques in this paper can help in increasing the accurateness and wholeness of network topology discovery and can control existing protocol and hardware features, and also can be implemented easily.
Authors and Affiliations
K Laxmi Narayan| Assistant Professor, Department of ECE, Kodaikanal Institute of Technology Machur, Kodaikanal, India, S Jafar Ali Ibrahim| Assistant Professor, Dept of IT Kodaikanal Institute of Technology Machur, Kodaikanal, India
An Error Notification Method for a High Speed Serial Communication on FPGA
In parallel communication the cost as well as complexity of the system increases due to simultaneous transmission of data bits on multiple wires. Serial communication alleviates this drawback and emerges as effective...
Seamless Mobility in Heterogeneous Mobile Networks
The objective of this paper is to introduce a vertical handover (VHO) algorithm between wireless LANs (WLANs) and LTE mobile networks. The proposed algorithm is based on the fuzzy control theory and takes into conside...
Optimal Quantum Measurement Design on Speech Signal: Blind Minimax Estimator Improving MSE Over LS Estimators
We consider the problem of estimating an unknown, deterministic speech signal parameters based on quantum measurements corrupted by white Gaussian noise. We design and analyze blind minimax estimator (BME), which consist...
FPGA Based Implementation of Genetic Algorithm Using VHDL
The research on genetic algorithm is normally concentrate on software Implementation, which is always restricted in term of high real time by computer system because it is serial calculation. This paper introduces a hard...
Knowledge Transfer of Experienced Exploratory Testers in Real Operational Setting
Test combinations executed by exploratory testers are of utmost importance towards error detection and cannot be designed by test case based or scripted techniques. Tests are designed and executed at the same time, a...