Information security through dual transformation techniques for the unsecured network

ISSN: 22773878
0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.

Abstract

Background: For the past two decades, cryptography techniques and methodologies play an inevitable role in the unsecured network. Intrusions and sniffing can be prevented through the above-said cryptography. In the 20th century, the inventions of the electromagnetic and complex machines are done remarkable jobs in the field of cryptography. The famous Enigma rotor machine is used to encrypt the text and the same is difficult to break. Literally speaking cryptography is the branch of number theory needs more integral solutions. Asymmetry algorithm is mainly used in prime theory. The classical cryptography and the ciphers are to protect the secrets. Objective: The objective of the research work is to maintain security to the messages and also to keep the integrity of the message. In the research arena, umpteen numbers of methods and technologies flood all the way in the cryptography technology. Method:The proposed methodology in this work is towards mathematical ideology like Laplace and Fourier transforms. By the way of above said two methodologies forward and reverse methods adopted both in Laplace and Fourier. Results: The outcome of the work shows the greater accuracy and difficult to tap the message in the unsecured network by the intruders. Mathematical implementations adopted throughout the research paper to emphasize the research outcome of the article.

Cite

CITATION STYLE

APA

Sekar, K. R., Saichandan Reddy, K., Srivardhan Reddy, P., Sathiamoorthy, G., & Vyshnavi Sphoorthi, R. (2019). Information security through dual transformation techniques for the unsecured network. International Journal of Recent Technology and Engineering, 8(1), 504–507.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free