Open Access Open Access  Restricted Access Subscription Access

Cryptography: a Mathematical Approach


Affiliations
1 SITE, VIT University, India
 

Networking is a way of connecting geographically distributed devices so as to communicate and share resources such as printers, files etc. Nowadays, Networking is extensively used in banking sector, e–commerce, social networking sites, news groups, sharing of software, sharing of valuable information among others and so many more. The unauthorized access to these networks is restrained by the administrator who apply and use various provisions and policies which is termed as network securities. Network security refers to any activity designed to protect network. Network security is an extremely valuable and procreative amenity. A threat exists whenever the security is perceived to get breached and vulnerability likely to be exploited. To enhance and strengthen a safeguard mechanism in protecting information multiple layers of security are implemented in our algorithm instead of adopting a single layer which at times may fall through.

Keywords

Transposition, Randomization, Quadratic Encryption, Hash Code, Cryptography
User

  • Stallings W (2006). Cryptography and Network Security: Principles and Practice, 4th Edn, Prentice Hall, Englewood Cliffs, NJ.
  • Sakalli M T, Bulus E et al. (2004). Cryptography education for students, Information Technology Based Higher Education and Training, ITHET 2004, Proceedings of the Fifth International Conference on, 621–626.
  • Ma J (2010). Fractal theory based on the pseudo–attacks on encryption model, Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, vol 9, 659–662.
  • National Institute of Standards and Technology (1999). Data Encryption Standard (DES), Federal Information Processing Standards Publication, (46–3). Available from: http://csrc.nist.gov/sryptval/des.htm
  • Vignesh R S, Sudharssun S et al. (2009). Limitations of quantum & the versatility of classical cryptography: a comparative study, Environmental and Computer Science, ICECS ‘09 Second International Conference on, vol 333(337), 28–30.
  • Shannon C E (1949). Communication theory of secret systems, Bell System Technical Journal, vol 28(4), 658–715.
  • Kaur R, and Kaur A (2012). Digital signature, Computing Sciences (ICCS), 2012 International Conference on, 295–301.
  • Lakshmanan T, and Muthusamy M (2012). A novel secure hash algorithm for public key digital signature schemes, The International Arab Journal of Information Technology, vol 9(3), 262–267.
  • Blinn J F (2005). How to solve a quadratic equation?, Computer Graphics and Applications, IEEE, vol 25(6), 76–79.
  • Swartzlander D (2007). Pythagorean Triples, MAT Exam Expository Papers,.Paper 42.
  • Ciobanu G, and Rusu D (2007). Pythagoras: an interactive environment for plane geometry, Intelligent Computer Communication and Processing, 2007 IEEE International Conference on, 283–286.
  • Ayushi (2010). A symmetric key cryptographic algorithm, International Journal of Computer Applications, vol 1(15), 1–4.

Abstract Views: 518

PDF Views: 0




  • Cryptography: a Mathematical Approach

Abstract Views: 518  |  PDF Views: 0

Authors

P. M. Durai Raj Vincent
SITE, VIT University, India
Syed Amber Iqbal
SITE, VIT University, India
Karan Bhagat
SITE, VIT University, India
Kamal Kant Kushwaha
SITE, VIT University, India

Abstract


Networking is a way of connecting geographically distributed devices so as to communicate and share resources such as printers, files etc. Nowadays, Networking is extensively used in banking sector, e–commerce, social networking sites, news groups, sharing of software, sharing of valuable information among others and so many more. The unauthorized access to these networks is restrained by the administrator who apply and use various provisions and policies which is termed as network securities. Network security refers to any activity designed to protect network. Network security is an extremely valuable and procreative amenity. A threat exists whenever the security is perceived to get breached and vulnerability likely to be exploited. To enhance and strengthen a safeguard mechanism in protecting information multiple layers of security are implemented in our algorithm instead of adopting a single layer which at times may fall through.

Keywords


Transposition, Randomization, Quadratic Encryption, Hash Code, Cryptography

References





DOI: https://doi.org/10.17485/ijst%2F2013%2Fv6i12%2F43626