Abstract-- The present era resembles the digital world, in which everything irrespective of technology, information is digitalized. The task of digital world is to present the data across the global without any interruptancy, intruder attacks or exploit attacks. To achieve this, all the sensitive information that is to be crawl over the earth’s surface is changed into cipher text which is unreadable or unknown to other sources. For this encryption, we go for different algorithms like symmetric and asymmetric such as DES, 3DES, AES, RSA, Blowfish, Hashing algorithms and so on. But in fact each and every algorithm has some cons in matter of size, speed, time and breakage of cipher to some extent. So this paper proposes a new hybrid algorithm ...
The new attack methods show some lacuna in the encryption algorithms and key schedule. As the streng...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social medi...
Today security is the important thing that we need to transpose data from a location to another safe...
Cryptography is the process of securely transmission of data. Cryptography is the process of Encrypt...
In these days securing a network is an important issue. Many techniques are provided to secure netwo...
Cyber security ensures a secure information exchange and enables communication through the Internet....
Cyber security ensures a secure information exchange and enables communication through the Internet....
Data security is the challenging issue in todaysworld that touches many areas using computercommunic...
Abstract--Cryptography is derived from Greek word ‘crypto ’ means secret ‘graphy ’ means writing tha...
Data protection is a complex problem affecting many areas including computers and communications. To...
Today the Internet is used more and more as a transportation for information. Much of the informatio...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social medi...
Abstract:Information security is the process of protecting information. It protects its availability...
ABSTRACT- In today’s competitive digital economy, the applications of cyber world require high level...
Cryptography was provided to secure communication between two parties known as sender and receiver i...
The new attack methods show some lacuna in the encryption algorithms and key schedule. As the streng...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social medi...
Today security is the important thing that we need to transpose data from a location to another safe...
Cryptography is the process of securely transmission of data. Cryptography is the process of Encrypt...
In these days securing a network is an important issue. Many techniques are provided to secure netwo...
Cyber security ensures a secure information exchange and enables communication through the Internet....
Cyber security ensures a secure information exchange and enables communication through the Internet....
Data security is the challenging issue in todaysworld that touches many areas using computercommunic...
Abstract--Cryptography is derived from Greek word ‘crypto ’ means secret ‘graphy ’ means writing tha...
Data protection is a complex problem affecting many areas including computers and communications. To...
Today the Internet is used more and more as a transportation for information. Much of the informatio...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social medi...
Abstract:Information security is the process of protecting information. It protects its availability...
ABSTRACT- In today’s competitive digital economy, the applications of cyber world require high level...
Cryptography was provided to secure communication between two parties known as sender and receiver i...
The new attack methods show some lacuna in the encryption algorithms and key schedule. As the streng...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social medi...
Today security is the important thing that we need to transpose data from a location to another safe...