Secure Verification Process in Smart Card Technology ijtsrd
Smart cards have proven to be quite useful as a contract sanction records medium in European countries. As their skills grow, they could become the ultimate thin client, finally trade all of the things we carry around in our wallet, including credit cards, licenses, cash, and even family photograph. By contain a choice of classification […]
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems ijtsrd
Computer and network security system are needed to protect data during their transmissions and to guarantee that data are authentic. Cryptography is useful not only for proving data to be secure but also for ensuring that data have not altered. So, it is needed to implement the public key cryptosystem in computer and network security […]
Performance Analysis of Data Encryption Standard DES ijtsrd
Information security is becoming much more important in data storage and transmission with the fast progression of digital data exchange in electronic way. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. The cryptography is most important aspect of communications security and becoming an important […]
Comparative Study of Security Algorithms IJTSRD
At present, through internet lots of confidential data is send across the world and though it is confidential it needs protection from unauthorized person who will try to read that data so to protect the data from unauthorized person security algorithms are used through which the original data can be able to convert into encrypted […]
A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques IJTSRD
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file […]