International Journal of Innovative Research in Engineering and Management
Year: 2016, Volume: 3, Issue: 2
First page : ( 122) Last page : ( 124)
Online ISSN : 2350-0557
Mr. Anil Hingmire , Mr. Sundal Jain , Ms. Aakanksha Choudhary , Mr. Pritam Hazra
With the ease that the Internet provides, now, it also, demands a higher security and a need of assurance that the confidential data remains intact till it reaches the other end. To fulfill this necessity, many algorithms and systems showed up-each with its own promises and drawbacks but they couldn’t withstand attacks like Brute Force and many others which were specially synthesized to crack these algorithms and fail such systems. In this paper, a new system, which ensures a secure transaction for all the scenarios, is discussed. The algorithm deals with keys which can be used for the future transactions and will be ensuring of secure transactions that the cryptanalyst won’t crack.
[1] https://en.wikipedia.org/wiki/History_of_cryptography
[2] International Journal of Innovative Research in Science, Engineering and Technology, Vol. 4, Issue 3, March 2015: A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms, Nivedita Bisht, Sapna Singh.
[3] R. Rivest,A Shamir, L. Aldeman, "A Methoed for Obtaining DigitalSignatures and Public-key Cryptosystems," J. Communications of the ACM, 1978, 21(2): 120-126.
[4] https://dedekindsparadise.wordpress.com/2011/07/24/limitati ons-of-rsa/
Department of Computer Engineering, Mumbai University, Mumbai, India
No. of Downloads: 8 | No. of Views: 2266
Preet Bhutani, Chandra Sekhar Dash.
August 2024 - Vol 11, Issue 4
Tushar Maurya, Saurav Kumar Singh, Vikram Thakur, Sachin Chawla.
June 2024 - Vol 11, Issue 3
Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Upendra Nath Tripathi.
June 2024 - Vol 11, Issue 3
