Corpus ID: 195998524

Cryptography and Network Security

@inproceedings{Kahate2009CryptographyAN,
  title={Cryptography and Network Security},
  author={Atul Kahate},
  year={2009}
}

Topics from this paper

Implementasi Algoritma Kriptografi Vernam Cipher dan DES (Data Encryption Standard) pada Aplikasi Chatting berbasis Android
TLDR
Dalam penelitian ini penulis menggabungkan dua algoritma kriptografi untuk mengamankan pesan chatting yaitu Vernam Cipher dan DES (Data Encryption Standard) dengan menggunakan Android Studio sebagai IDE. Expand
CRYPTOGRAPHIC ALGORITHMS FOR EFFICIENT STORAGE OF PASSWORD
Cryptographic algorithms are used to store the password in back end with securely and efficiently. Cryptographic hash functions is used to convert variable size of data into fixed size and the wordExpand
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA C OMMUNICATION
TLDR
Experimental results show that the correlation and entropy values of the image with encrypted data before the insertion are similar to the values of correlated and entropy after the insertion thus reduces the chance of the confidential message being detected and enables secret communication. Expand
SECURE DATA TRANSMISSION USING STEGANOGRAPHY AND ENCRYPTION TECHNIQUE
TLDR
Experimental results show that the visual and the statistical values of the image with encrypted databefore the insertion are similar to the values after the insertion thus reduces the chance of the confidential message being detected and enables secret communication. Expand
Analysis of Four Historical Ciphers Against Known Plaintext Frequency Statistical Attack
TLDR
This research is carried out to examine and to analyse the security level of these four historical ciphers by using known plaintext frequency statistical attack and shown that Playfair cipher and Hill cipher have better security compare with Vigenere cipher and Random Substitution cipher. Expand
Towards the CP-ABE Application for Privacy-Preserving Secure Data Sharing in IoT Contexts
TLDR
A novel architecture combining the flexibility and expressiveness of CP-ABE and the efficiency of symmetric key encryption techniques is proposed, with the purpose of carrying out secure data exchanges and preserving the participating entities privacy. Expand
A Crypto-Steganography: A Survey
TLDR
A new method based on the combination of both cryptography and steganography known as Crypto-Steganography which overcome each other’s weaknesses and make difficult for the intruders to attack or steal sensitive information is being proposed. Expand
Transposition cryptography algorithm using tree data structure
TLDR
An attempt is made to present a new encryption, decryption algorithm on transposition cryptography algorithm for block cipher using tree and other data structure approaches. Expand
Zigzag Ciphers: A Novel Transposition Method
TLDR
This paper sets out to develop a hybrid way of encryption of plain text by combining rail fence cipher and columnar transposition cipher, which provides more security to information when compared with simple columnartransposition. Expand
...
1
2
3
4
5
...