Cyber Security Intelligence ijtsrd
“Governments, military, organizations, financial institutions, universities and other businesses collected, process and store a large amount of confidential information and data on computers and transmit that data over networks to other computers. With the continuous rapid growth of volume and sophistication of cyberattacks, quick attempts are required to secure sensitive business and personal information, as […]
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm ijtsrd
Transferring the secure data becomes vital for the important data of every days life. The system is a secure data transferring, combining the two techniques, Advance Encryption Standard AES and RSA. The data file is encrypted by using AES with the randomly generated key. This key is also encrypted by RSA using the receivers public […]
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems ijtsrd
Computer and network security system are needed to protect data during their transmissions and to guarantee that data are authentic. Cryptography is useful not only for proving data to be secure but also for ensuring that data have not altered. So, it is needed to implement the public key cryptosystem in computer and network security […]
Achieving Secure, Universal, and Fine Grainedquery Results Verification for Secure Searchscheme Over Encrypted Cloud Data ijtsrd
Secure pursuit strategies over encoded cloud information enable an approved client to inquiry information documents of enthusiasm by submitting scrambled question catchphrases to the cloud server in a protection safeguarding way. In any case, practically speaking, the returned question results might be mistaken or deficient in the exploitative cloud condition. For instance, the cloud server […]
Performance Analysis of Data Encryption Standard DES ijtsrd
Information security is becoming much more important in data storage and transmission with the fast progression of digital data exchange in electronic way. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. The cryptography is most important aspect of communications security and becoming an important […]