Carapace for Intranet Security of Data Communication Layer

Authors

  • Premchand Ambhore Computer Science and Engineering , Amravati University, Amravati, India Author
  • B B Meshramr Computer Engineering Department, VJTI Mumbai, India Author
  • Archana Wankhade Information Technology Government College of Engg.Amravati (M.S.) India Author

Keywords:

security, cryptography, protocols, algorithms.

Abstract

Cryptography is a tool that can be used to keep information confidential and to ensure its integrity and authenticity. All modern cryptographic system are based on Kirchhoff’s principle of having a publicly known algorithm and a private or secret key. Many cryptographic algorithms use complex transformations involving substitutions and permutations to transform the plain text into cipher text. However, if quantum cryptography can be made practical, the use of one pads may provide truly unbreakable cryptosystems. Cryptographic algorithms can be divided into symmetric key algorithms and public key algorithms. Symmetric key algorithms mangle the bits in a series of rounds parameterized by the key to turn the plaintext into cipher text. The main public key algorithm is RSA, public key algorithms. Commonly messages to be signed are hashed using algorithms such as MD-5 and SHA-1 and then hashes are signed rather than original messages. Including some that use a trusted third party, Diffie-Hellman, Keberos and Public-Key cryptography. Digital data transmission raises many issues in which technology interacts strongly with public policy. Some of the areas include privacy, freedom of speech and copy right. Thus we have seen the basic reasons and requirements to provide data transmission security and its importance. The data transmission security can be achieved by using combination of RSA, AES, and SHA-1 algorithms. This eliminates the threats to the data transmission security. Voice data, image and text data from Host A to Host B is sent securely.

References

Downloads

Published

2014-12-31

Issue

Section

Articles

How to Cite

Carapace for Intranet Security of Data Communication Layer. (2014). International Journal of Current Engineering and Technology, 4(6), 3961-3965. https://ijcet.evegenis.org/index.php/ijcet/article/view/1501