A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Jirapure, Sanket
- A Critical Review of Different Cryptographic Technique in Pretty Good Privacy
Authors
1 Department of Electronics, University of York, York YO10 5DD, GB
Source
International Journal of Scientific Engineering and Technology, Vol 3, No 1 (2014), Pagination: 17-21Abstract
E-mail service is one of the most essential Internet Services. E-mail security be composed of confidentiality, authentication and message integrity. Pretty Good Privacy (PGP) is an email security protocol. It helps in encryption of the plain text data giving them cryptographic privacy and authentication. Cryptographic technique is used to encrypt and decrypt data. Cryptography implements to store prime data or transmit it across the receiver so that only recipient can read that data. In this paper, we pointed out the review on different cryptographic techniques for PGP on the basis of difference in working and impact on level of security. We take into consideration the cryptographic technique such as The Rivest-Shamir-Adleman (RSA) and Digital Signature Standard (DSS) for authentication and integrity, the International Data Encryption Algorithm (IDEA) for confidentiality.Keywords
PGP, RSA, DSS, IDEA, Authentication, Confidentiality, Encryption, CCA, WSN.- A Critical Review of Security Mechanisms in Virtual Private Networks
Authors
1 Department of Electronics, University of York, York YO10 5DD, GB
Source
International Journal of Scientific Engineering and Technology, Vol 2, No 12 (2013), Pagination: 1168-1172Abstract
This paper discusses about the security mechanisms employed by VPN for the purpose of authentication and confidentiality of the network data, with mainly focusing on how these technologies are used, how they provides the protection, and how the potential threats can be used against them. The security mechanisms of VPN are reviewed and analysed in this paper. Security mechanisms as SSL/TLS, IPSEC, etc. which provides encryption and authentication, security between gateways, respectively were summarized.
In this paper we presented some reviews regarding the use, protection, and potential threats used against VPN security technologies and then discussed according to the requirements of these technologies in the VPN. Finally, we presented some conclusions.