CFP last date
20 December 2024
Reseach Article

Quality Analysis of Network Security using Cryptographic Techniques

Published on February 2019 by Aniket Dalvi, Charul Dalvi, Rahul Deshmukh
Leveraging Information Technology for Inter-Sectoral Research
Foundation of Computer Science USA
ICAIM2017 - Number 3
February 2019
Authors: Aniket Dalvi, Charul Dalvi, Rahul Deshmukh
d4f64abb-9003-4f5f-9622-baf3384922f3

Aniket Dalvi, Charul Dalvi, Rahul Deshmukh . Quality Analysis of Network Security using Cryptographic Techniques. Leveraging Information Technology for Inter-Sectoral Research. ICAIM2017, 3 (February 2019), 22-24.

@article{
author = { Aniket Dalvi, Charul Dalvi, Rahul Deshmukh },
title = { Quality Analysis of Network Security using Cryptographic Techniques },
journal = { Leveraging Information Technology for Inter-Sectoral Research },
issue_date = { February 2019 },
volume = { ICAIM2017 },
number = { 3 },
month = { February },
year = { 2019 },
issn = 0975-8887,
pages = { 22-24 },
numpages = 3,
url = { /proceedings/icaim2017/number3/30401-1750/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Leveraging Information Technology for Inter-Sectoral Research
%A Aniket Dalvi
%A Charul Dalvi
%A Rahul Deshmukh
%T Quality Analysis of Network Security using Cryptographic Techniques
%J Leveraging Information Technology for Inter-Sectoral Research
%@ 0975-8887
%V ICAIM2017
%N 3
%P 22-24
%D 2019
%I International Journal of Computer Applications
Abstract

Data or Information security is a testing issue today that requests a strong encryption which is exceptionally hard to break. System Security is the most fundamental part in data security in light of the fact that it is in charge of securing all data went through organized PCs. A considerable measure of examination has been carried out in cryptography such a large number of specialists have proposed diverse calculations for encryption. Data can be access by unapproved client for insidious reason. In this way, it is critical to actualize successful encryption/decoding calculations for more security. In this paper we have given an extensive mixture of different calculations and systems, for example, Triple DES, BREA, AES, Elliptic Curve Cryptography, CryptoStegnography, Dual RSA, Stream and Block figures, and Quantum Cryptography through which information will be secured. A definite examination is carried out to have an acceptable view about all the methods, nature of every strategy and will examine open key base, really great protection, computerized signature, private key encryption, piece shrewd parallel encryption.

References
  1. https://en. wikipedia. org/wiki/Cryptography .
  2. https://en. wikipedia. org/wiki/Public- key_cryptography.
  3. fttps://www. researchgate. net/publication/283770069_Byte_Rotation_Encryption_Algorithm_through_parallel_processing_and_multi-core_utilization.
  4. http://science. howstuffworks. com/science-vs-myth/everyday-myths/quantum-cryptology. html.
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic Curve Quantum Cryptography Private Key Encryption