Now a day's every organization believes that the important asset in their organization is data. Secure data communication through network is needed as organizations tend to move data from one place to other place for business activities. In these situations variety of security mechanisms are needed to overcome security attacks. The range of security is based on diffusion of data and confusion. To achieve high security algorithms that are developed to protect data must be different in their structure. The use of special functions in the algorithms defines the strength of each algorithm. In this paper different types of pairing functions are discussed that has a unique nature of handling real numbers while processing. The pairing functions discussed have their own advantages and disadvantages which are also discussed in this work.
In present days electronic communication is a fundamental method of exchanging information. Secure communication is a major concern by which people can share information with varying degrees of certainty that third parties cannot capture the information that is transmitted over network. With the introduction of internet and distributed systems security issues are more challenging and complex. Hence information security is an important consideration in these days. Cryptography and information security is helping to develop more number of practical approaches to enforce security for networks. In this paper the proposed algorithm which uses basic encryption techniques like substitution, transposition, bitwise logical operations along with pairing function to encrypt the data. The algorithm itself generates the key from plain text and hides within plaintext.
Increase in on-line activities or E-commerce there is a need of efficient and secure management of records that store the data of various transactions and its assets. It is very difficult to manage large number of records manually where different operations are to be carried-out in limited period of time. It basically increases time and effort in traditional transaction management and in goods management process in business field where human resource are applied, and there is a problem of knowing the stock details like expiration through manual record checking. So, this work provides a technique to give efficient record management and secured transactions by retrieving efficient information from the tag contained in goods or stocks. It gives quick information about stock while verification. So, it provides information like Product name, Tag -id, DMFG, expiry date and details about how long the product can be used. Through this work time can be saved in processing the records and cost in doing business activities will be minimized.
Visual cryptography is a technique that is used to share the secret data in the form of images for acquiring data security. This technique involves encryption and decryption processes for securing data. In encryption process the original image is divided into number of shares and then sends to other end. In decryption by using simple computations the subset of shares combined to reconstruct the original image. In the proposed method by using bit sharing method the original image is divided into four shares. These shares are covered with different cover images by using genetic algorithm and mathematical operations along with column transposition.
E-commerce is field that is growing all over the world at a greater speed. This is possible with extension of internet services to each and every corner of the world. As the users are moving towards online business and increasing in number day by day towards online services there is every need to have security at various levels in electronic business. Security mechanisms play a vital role in providing security to online business applications and there is need to improve security services periodically to counter the activities of hackers. In this paper concept of gates and different mathematical operations are used in existing RC2 model to extend the security and examine the possibility of inclusion of different operations in existing systems.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.