The ever increasing technologies with parallel advancements in the development of notorious attempts, to play with the integrity of the information, in the field of communication over the internet present the need for the equally enhancing security measures. We here, try to analyze the security steps and related phenomena which have been developed specific to the symmetric cryptosystems. With the application of different protocols and their related drawbacks, we try to introduce a few changes, if possible, without diminishing the essence of such protocols. Our attempt is to look for the possibility of introducing asymmetric cryptosystem security measures to meet our purpose. The works already being done are a source of reference to invoke something inquisitive towards our topic. Such works include techniques such as key management, magic rectangle, hash functions, encrypted key exchange, etc.
In the time of extreme proclivity of users towards internet and its services, it is almost implied to worry for the concerned security of highly confidential information. So, are the available safety trends and the continuous endeavor in this domain towards unfolding new techniques with enhanced features suggest pioneering concerns of the associated parties for preserving the integrity of underlying system(s). Having gone through some of the works available, we can easily gaze at the much talked issues in the field of network business (specifically communication) demanding the robust cryptosystems with adjusting feature(s) to safeguard the interest(s) of communicating parties. It is immaterial to talk about cryptosystems without touching the edges of famous algorithm i.e., R.S.A. algorithm. We, here, attempt to mention a few of the developing techniques that have/are gathering attention from masses associated with this field.
Abstract -The susceptible nature of information against forthcoming threats has become a ponderous affair for the professionals of this field. It is a result of the rational and steady struggle by the carrying people that has produced multiple approaches which shields vital information from speculated security attacks. For the everyday users who are unfamiliar of these potential incursion(s) to their intimate information, feel helpless when they encounter persecutor(s) who wish to exploit the confidentiality of this elemental information. Here we have discussed about a distinctive approach which deal with these upcoming attacks. We have tried to produce an algorithm which will safeguard users against objectionable invasion of reserved information. We have incorporated a set of diverse techniques to produce an algorithm which is immune to these incursions.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.