Software Piracy Protection IJTSRD
Software piracy by users is generally believed to harm both software firms through lower profits and buying customers through higher prices . Thus, it is thought that perfect and cost less technological protection would benefit both firms and consumers. The model developed here suggests that in some circumstances, even with significant piracy, not protecting can […]
AES Algorithm: Encryption and Decryption IJTSRD
Advanced Encryption Standard (AES) algorithm is one of the most common and widely used symmetric block cipher algorithm. This algorithm has its own particular structure to encrypt and decrypt sensitive data and is applied in hardware and software, all over the world. It is extremely difficult for hackers to get the real data when encrypting […]
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET) IJTSRD
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in […]
Cloud Cryptography IJTSRD
Cloud computing is the emerging trend in today’s world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important data’s in […]
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decomposition Method IJTSRD
In symmetric key algorithm in linear block cipher to encrypt and decrypt the messages using matrix and inverse matrix. In this proposed technique generate lower and upper triangular matrices from the square matrix using decomposition. In encryption process, the key is a lower triangular matrix and decryption process, the key is upper triangular matrix under […]