The need for data security in Information and Communications Technology (ICT) can not be overemphasized. In this paper, the use of symmetric and asymmetric key cryptographies to clearly achieve the required protection by means of prime number system and modular multiplicative inverse has been highlighted and elucidated. In this arrangement the algorithm for encryption is C= Me mod n, where C is the integer value for the cipher text, M is the integer value for the plain text, n the product of two prime numbers p and q and e is a number that is co-prime to (p-1) *(q- 1). For the decryption algorithm, M = Cd mod n with C, M and n retaining their meanings, d is anumber that is modular multiplicative inverse of e. The primality test considered F...
Data protection is a complex problem affecting many areas including computers and communications. To...
Now a day, we are having a great dependence on computer and network for communication. The security ...
Today security is the important thing that we need to transpose data from a location to another safe...
Cryptography provides a method of exchanging sensitive information in a secured form while assuring ...
Today security is the important thing that we need to transfer data from location to another safely...
Abstract- Cryptography is an art and science. It is a playing major role in information and security...
Abstract- Cryptography is the mathematical system which is used to provides privacy and authenticati...
In this paper we have developed a new symmetric key algorithm for encryption and decryption of data ...
The design of algorithms for sending confidential messages (i.e. messages that no one can read, exce...
Internet was the invention in the field of ICT for purpose of exchange of information and shortens t...
Abstract — Encryption is the process of encoding messages or information in such a way that only aut...
An encryption method is presented with the novel property that publicly revealing an encryption key ...
An encryption method is presented with the novel property that publicly revealing an encryption key ...
The services such as electronic commerce, internet privacy, authentication, confidentiality, data in...
This paper proposes new symmetric cryptoalgorithms of Residue Number System and its Modified Perfect...
Data protection is a complex problem affecting many areas including computers and communications. To...
Now a day, we are having a great dependence on computer and network for communication. The security ...
Today security is the important thing that we need to transpose data from a location to another safe...
Cryptography provides a method of exchanging sensitive information in a secured form while assuring ...
Today security is the important thing that we need to transfer data from location to another safely...
Abstract- Cryptography is an art and science. It is a playing major role in information and security...
Abstract- Cryptography is the mathematical system which is used to provides privacy and authenticati...
In this paper we have developed a new symmetric key algorithm for encryption and decryption of data ...
The design of algorithms for sending confidential messages (i.e. messages that no one can read, exce...
Internet was the invention in the field of ICT for purpose of exchange of information and shortens t...
Abstract — Encryption is the process of encoding messages or information in such a way that only aut...
An encryption method is presented with the novel property that publicly revealing an encryption key ...
An encryption method is presented with the novel property that publicly revealing an encryption key ...
The services such as electronic commerce, internet privacy, authentication, confidentiality, data in...
This paper proposes new symmetric cryptoalgorithms of Residue Number System and its Modified Perfect...
Data protection is a complex problem affecting many areas including computers and communications. To...
Now a day, we are having a great dependence on computer and network for communication. The security ...
Today security is the important thing that we need to transpose data from a location to another safe...