2017
DOI: 10.21474/ijar01/3207
|View full text |Cite
|
Sign up to set email alerts
|

Protection of Key in Private Key Cryptography.

Abstract: The ever increasing technologies with parallel advancements in the development of notorious attempts, to play with the integrity of the information, in the field of communication over the internet present the need for the equally enhancing security measures. We here, try to analyze the security steps and related phenomena which have been developed specific to the symmetric cryptosystems. With the application of different protocols and their related drawbacks, we try to introduce a few changes, if possible, wit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
3

Relationship

3
0

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…To summarize all the concepts, first of all we talk about the cryptography process step by step where we try to find out all about cryptography, its applications, techniques, security and keys then we move to the essential security part where we can apply methods which would provide security to our private key [1] and make it secure against any invasion practices carried out by invaders. Next step in the process of safeguarding the communication is selecting the method.…”
Section: Introductionmentioning
confidence: 99%
“…To summarize all the concepts, first of all we talk about the cryptography process step by step where we try to find out all about cryptography, its applications, techniques, security and keys then we move to the essential security part where we can apply methods which would provide security to our private key [1] and make it secure against any invasion practices carried out by invaders. Next step in the process of safeguarding the communication is selecting the method.…”
Section: Introductionmentioning
confidence: 99%
“…It has been one of the undisputed requirements that user(s) do expect the transmission of information with no change in its order of reference [1]. This prompted us to make our effort by considering a data structure called doubly linked list.…”
Section: Introductionmentioning
confidence: 99%
“…However, this uncomplicated nature of private key encryption makes it sensitive against these potential incursions made to sabotage the confidentiality of this intimate information. In our paper "Protection of key in Private Key Cryptography" [1] we deal with the Importance of cryptography and goes with all security issues as well as to improve the pillars i.e. Encryption of plain text and [3].…”
Section: Introductionmentioning
confidence: 99%