CFP last date
20 January 2025
Reseach Article

Secured Wireless Data Communication

by Dnyanda Namdeo Hire
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 54 - Number 1
Year of Publication: 2012
Authors: Dnyanda Namdeo Hire
10.5120/8532-2064

Dnyanda Namdeo Hire . Secured Wireless Data Communication. International Journal of Computer Applications. 54, 1 ( September 2012), 27-30. DOI=10.5120/8532-2064

@article{ 10.5120/8532-2064,
author = { Dnyanda Namdeo Hire },
title = { Secured Wireless Data Communication },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 54 },
number = { 1 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 27-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume54/number1/8532-2064/ },
doi = { 10.5120/8532-2064 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:55:06.676418+05:30
%A Dnyanda Namdeo Hire
%T Secured Wireless Data Communication
%J International Journal of Computer Applications
%@ 0975-8887
%V 54
%N 1
%P 27-30
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of data and new algorithms are evolving. Polyalphabetic substitution cipher is a strong algorithm used for security of data in army stations. In this paper, various techniques of security of data and one the algorithm using polyalphabetic substitution cipher are discussed.

References
  1. A. S. Tanenbaum, "Computer Networks", 2nd Edition, PHI.
  2. http://www. cryptojinas. com-information of cryptography
  3. William Stallings, "Cryptography and Network Security", 3rd Edition, Pearson Education.
  4. Evangelos Kranakis, "Primality and Cryptography", John Wiley & Sons.
  5. Douglas A. Stinson, "Cryptography, Theory and Practice", 2nd Edition, Chapman & Hall, CRC Press Company, Washigton.
  6. http://www. truecrypt. org
  7. B. B. Edwards Jr. Master Keying by the Numbers (2/e). Security Resources. Pensacola, FL, USA. 1997.
  8. B. W. Lampson. "Hints for computer system design. " ACM Operating Systems Rev. 15, 5 (Oct. 1983),pp 33-48.
  9. M. W. Tobias. Locks, Safes and Security (2/e). Charles Thomas Publisher, Ltd. Springfield, IL, USA. 2000.
  10. J. Andrews. Fundamentals of Master Keying. Associated Locksmiths of America. 1990.
  11. Matt Blaze Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks, AT&T Labs – Research, IEEE Security and Privacy, March/April 2003.
  12. http://www. freeotfe. org
  13. Andrews, M. , and Whittaker, J. "Computer Security. " IEEE Security and Privacy, September/October 2004.
  14. National Institute of Standards and Technology. An Introduction to Computer Security: The NIST Handbook. Special Publication 800-12, October 1995.
  15. Gardner, M. Codes, Ciphers, and Secret Writing. New York: Dover, 1972.
  16. Garrett, P. Making, Breaking Codes: An Introduction to Cryptology. Upper Saddle River, NJ: Practice Hall, 2001.
  17. http://www. hpccsystems. com
  18. Kahn, D. The Codebreakers: The Story of Secret Writing. New York: Scribner, 1996.
  19. Korner, T. The Pleasures of Counting. Cambridge, England: Cambridge University Press, 1996.
  20. Kumar, I. Cryptology. Laguna Hills, CA: Aegean Park Press, 1997.
  21. Nichols, R. Classical Cryptography Course. Laguna Hills, CA: Aegean Park Press, 1996.
  22. Nichols, R. , ed. ICSA Guide to Cryptography. New York: McGraw-Hill, 1999.
  23. Sinkov, A. Elementary Cryptanalysis: A Mathematical Approach. Washington, D. C. : The Mathematical Association of America, 1966.
  24. http://www. cryptool. com
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Encryption Decryption