Techniques for Secure Transmission

Author:   Abhishek Bhardwaj
Publisher:   Abhishek Bhardwaj
ISBN:  

9787685243960


Pages:   196
Publication Date:   28 September 2022
Format:   Paperback
Availability:   In stock   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Our Price $77.60 Quantity:  
Add to Cart

Share |

Techniques for Secure Transmission


Add your own review!

Overview

"Crypto has a long and exciting history. most do not complete technical description of Kahn of the matter is the automatic code he [140], a cryptogram from its first use, limited, about 4,000 years ago, in the 20th century, for the Egyptian people. Kahn's novel, published in 1967, examines the most important elements of the story (so far) to develop the theme. Researchers have always tried to break old encryptions (ciphers) and show technological advancements. A simple cipher that was impossible to break in a human life 10 years ago can now be deciphered by brute force in minutes. Therefore, security must cope with regular advances in technology to protect information. Hence, this research is needful for the today life, so we study to plan on different types of existing and new techniques of cryptographic algorithms. Some researchers show that how cryptographic techniques have grown and improved with time. It shows the commencement of encryption in ancient history. In addition, how it grew in the present time. Some work is done in showing techniques of current times, which were used for information hiding. A reversible data hiding technique is used which is based on local histogram shifting and multiple layers of embedding the data. In addition, data hiding in image is taken to next level by performing dual image based data hiding technique. In current times, there are mainly two different classes of cipheres symmetric and asymmetric ciphers. DES, AES, IDEA, Rc5, Rc6 family, is symmetric cipheres; RSA, ElGamal are examples of asymmetric key cryptography Attacks can be easily controlled by elliptic curve cryptosystems (ECC). Proven encryption is another technique that targets the extended security algorithm. It is difficult to look at the modified classification algorithms, but there are some variables that can be considered for each class's cryptographic algorithms; to be more precise, time to encrypt, time to decrypt, recurrence table and basically protection. These testing objectives compare each class to a retention algorithm and which one is optimal. SAFE is drawn from proven encryption which, when performed in software, claims to be better than AES. RSA is derived from asymmetric key cryptography, which is the first of its kind and is now known as one of the best algorithms for xxii encryption. Each of these algorithms has been implemented for the first time using the IR language and the results are compared with the search for the best results in time and safety. The studies proposed in the thesis investigate the various aspects of existing and new systems under these headings in different chapters. The study of different cryptographic techniques from past to future and its challenges; to implement the ChaCha stream cipher used in this algorithm and its impact; to compare the RSA, Triple-DES, AES to SAFE proposed algorithms; to Analyze the Performance of ""Proposed Sponge Function based Authentication Encryption technique (SAFE) using robust initialization vector and its impact. The research tries to present adequate contrast between the most popular algorithms used in the field of data encryption with our algorithm proposed in the past in this chapter 1 and 2. Since the efficiency of these algorithms in various technical configurations as described in chapter 3, which is our main concern in this case. The comparison presented algorithm takes into account the analysis of behavior and performance when different data loads were shown in chapter 5. In addition, chapter 6 explains about the results and comparison of speed and security between proposed algorithm ""SAFE"" and security algorithms currently in trend such as AES, DES, TDES, RSA, etc. And last chapter present brief conclusion"

Full Product Details

Author:   Abhishek Bhardwaj
Publisher:   Abhishek Bhardwaj
Imprint:   Abhishek Bhardwaj
Dimensions:   Width: 15.20cm , Height: 1.10cm , Length: 22.90cm
Weight:   0.268kg
ISBN:  

9787685243960


ISBN 10:   7685243962
Pages:   196
Publication Date:   28 September 2022
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   In stock   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Table of Contents

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List