Networking Communication and Data Knowledge Engineering

  • Dixit P
  • Kumar Gupta A
  • Trivedi C
  • et al.
N/ACitations
Citations of this article
16Readers
Mendeley users who have this article in their library.

Abstract

Information security is the process that protects its availability, privacy, and integrity. Access to stored information on computer databases has increased nowadays. Most companies store business and individual information in computer. Much of the information stored is highly confidential and not for knowing publicly. Data encryption is most traditional technique that secure highly confidential information by using some conventional algorithm, which already exist or prewritten. Most powerful part of encryption technique is key generation, which has two parts, one is symmetric key generation and another is asymmetric key generation. Nowadays hackers are easily capable to break the key with the help of modern high computing machines. Current need is strongly encrypted data which cannot be decrypt through cryptanalysis. Paper presented discusses some traditional as well as modern hybrid encryption techniques along with quantum approach such as RSA based on ECC with AVK, DES-RSA, RSA-based singular cubic curve, JCE, 3D chaotic map technique, Blowfish.

Cite

CITATION STYLE

APA

Dixit, P., Kumar Gupta, A., Trivedi, C., Yadav, V. K., Dixit, P., Trivedi, ⋅ M C, … Gupta, A. K. (2018). Networking Communication and Data Knowledge Engineering. Lecture Notes on Data Engineering and Communications Technologies, 4. Retrieved from https://doi.org/10.1007/978-981-10-4600-1_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free