• Afhalen na 1 uur in een winkel met voorraad
  • Gratis thuislevering in België vanaf € 30
  • Ruim aanbod met 7 miljoen producten
  • Afhalen na 1 uur in een winkel met voorraad
  • Gratis thuislevering in België vanaf € 30
  • Ruim aanbod met 7 miljoen producten
  1. Boeken
  2. Non-fictie
  3. Informatica
  4. Internet
  5. Techniques for Secure Transmission

Techniques for Secure Transmission

Abhishek Bhardwaj
Paperback | Engels
€ 44,45
+ 88 punten
Levering 1 à 4 weken
Eenvoudig bestellen
Veilig betalen
Gratis thuislevering vanaf € 30 (via bpost)
Gratis levering in je Standaard Boekhandel

Omschrijving

Crypto has a long and exciting history. most do not complete technical description of Kahn of the matter is the automatic code he [140], a cryptogram from its first use, limited, about 4,000 years ago, in the 20th century, for the Egyptian people. Kahn's novel, published in 1967, examines the most important elements of the story (so far) to develop the theme. Researchers have always tried to break old encryptions (ciphers) and show technological advancements. A simple cipher that was impossible to break in a human life 10 years ago can now be deciphered by brute force in minutes. Therefore, security must cope with regular advances in technology to protect information. Hence, this research is needful for the today life, so we study to plan on different types of existing and new techniques of cryptographic algorithms. Some researchers show that how cryptographic techniques have grown and improved with time. It shows the commencement of encryption in ancient history. In addition, how it grew in the present time. Some work is done in showing techniques of current times, which were used for information hiding. A reversible data hiding technique is used which is based on local histogram shifting and multiple layers of embedding the data. In addition, data hiding in image is taken to next level by performing dual image based data hiding technique. In current times, there are mainly two different classes of cipheres symmetric and asymmetric ciphers. DES, AES, IDEA, Rc5, Rc6 family, is symmetric cipheres; RSA, ElGamal are examples of asymmetric key cryptography Attacks can be easily controlled by elliptic curve cryptosystems (ECC). Proven encryption is another technique that targets the extended security algorithm. It is difficult to look at the modified classification algorithms, but there are some variables that can be considered for each class's cryptographic algorithms; to be more precise, time to encrypt, time to decrypt, recurrence table and basically protection. These testing objectives compare each class to a retention algorithm and which one is optimal. SAFE is drawn from proven encryption which, when performed in software, claims to be better than AES. RSA is derived from asymmetric key cryptography, which is the first of its kind and is now known as one of the best algorithms for xxii encryption. Each of these algorithms has been implemented for the first time using the IR language and the results are compared with the search for the best results in time and safety. The studies proposed in the thesis investigate the various aspects of existing and new systems under these headings in different chapters. The study of different cryptographic techniques from past to future and its challenges; to implement the ChaCha stream cipher used in this algorithm and its impact; to compare the RSA, Triple-DES, AES to SAFE proposed algorithms; to Analyze the Performance of "Proposed Sponge Function based Authentication Encryption technique (SAFE) using robust initialization vector and its impact. The research tries to present adequate contrast between the most popular algorithms used in the field of data encryption with our algorithm proposed in the past in this chapter 1 and 2. Since the efficiency of these algorithms in various technical configurations as described in chapter 3, which is our main concern in this case. The comparison presented algorithm takes into account the analysis of behavior and performance when different data loads were shown in chapter 5. In addition, chapter 6 explains about the results and comparison of speed and security between proposed algorithm "SAFE" and security algorithms currently in trend such as AES, DES, TDES, RSA, etc. And last chapter present brief conclusion

Specificaties

Betrokkenen

Auteur(s):
Uitgeverij:

Inhoud

Aantal bladzijden:
196
Taal:
Engels

Eigenschappen

Productcode (EAN):
9787685243960
Verschijningsdatum:
28/09/2022
Uitvoering:
Paperback
Bestandsformaat:
Trade paperback (VS)
Afmetingen:
152 mm x 229 mm
Gewicht:
267 g
Standaard Boekhandel

Alleen bij Standaard Boekhandel

+ 88 punten op je klantenkaart van Standaard Boekhandel
BUNDELPROMO

2+1 GRATIS op meer dan 200 producten

Profiteer nu van onze vroegboekkortingen
BUNDELPROMO
2+1 GRATIS op meer dan 200 producten
ACTIEPRIJS

€ 10 korting

op de Vivlio Light en Light HD e-reader
ACTIEPRIJS
Vivlio Light en Light HD e-reader met € 10 korting
AANGERADEN

Dé boeken bij jouw vakantiebestemming

door ons geselecteerd
AANGERADEN
Dé boeken bij jouw vakantiebestemming
Standaard Boekhandel

Beoordelingen

We publiceren alleen reviews die voldoen aan de voorwaarden voor reviews. Bekijk onze voorwaarden voor reviews.