Learn More
In order to achieve the security for the e-business application, generally the organizations follow the cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The RSA and NTRU belong to the category of asymmetric key cryptosystem. RSA is one of the oldest and the most widely used public key cryptographic(More)
Grid computing architecture was defined to be a complete physical layer. Shared data systems have grown in numbers and hence they are susceptible to many security challenges. We proposed the encryption algorithm, i.e., N-th degree truncated polynomial ring (NTRU) in every grid node to keep the information in security. Sender requests key code from receiver(More)
In the modern world data security is an essential part to inviolability of the crucial facts. Now the days we deal with digital world to perform tasks such as online cash withdraw from bank, cash submission to bank and online payment receive from clients, online payments to our sellers etc. With the ease to get internet connection, we can say that(More)
In order to achieve the security for the e-business application, generally, the organizations follow the cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric key cryptosystem and RSA, NTRU[3] belongs to the category of asymmetric key cryptosystem.(More)
  • 1