Data Encryption Approach For Security
R. Arya1
Section:Review Paper, Product Type: Journal Paper
Volume-2 ,
Issue-5 , Page no. 176-179, May-2014
Online published on May 31, 2014
Copyright © R. Arya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: R. Arya, “Data Encryption Approach For Security,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.176-179, 2014.
MLA Style Citation: R. Arya "Data Encryption Approach For Security." International Journal of Computer Sciences and Engineering 2.5 (2014): 176-179.
APA Style Citation: R. Arya, (2014). Data Encryption Approach For Security. International Journal of Computer Sciences and Engineering, 2(5), 176-179.
BibTex Style Citation:
@article{Arya_2014,
author = {R. Arya},
title = {Data Encryption Approach For Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2014},
volume = {2},
Issue = {5},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {176-179},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=182},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=182
TI - Data Encryption Approach For Security
T2 - International Journal of Computer Sciences and Engineering
AU - R. Arya
PY - 2014
DA - 2014/05/31
PB - IJCSE, Indore, INDIA
SP - 176-179
IS - 5
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3667 | 3478 downloads | 3755 downloads |
Abstract
Whenever any new algorithm for data encryption is designed the main concern is upon the security of data. As encryption is done for encrypt data or change data in a secure form, so such encryption techniques should be used which provide the best security to the network. The main goal of any algorithm should be to secure data from any outside attack. In the recent days there are so many security issues regarding exchanging of data through a network. So data has to be encrypted in such a way that there is no threaten to secutiry. A new approach for data encryption is provided in this paper which will be helpful for security of data.
Key-Words / Index Term
DES, Encryption, Decryption, Asymmetric Cryptography, Symmetric Cryptography
References
[1] R. Hauser, A. Przygienda and G. Tsudik, �Reducing the cost of security in link state routing�, In Symposium on Network and Distributed Systems Security (NDSS ‟97), San Diego, California, Internet Society, pp 93�99, February 1997.
[2] A. Kush, �Security Aspects in AD hoc Routing� , Computer Society of India Communications, Vol. 3 No 2 Issue 11, pp 29-33, March 2009.
[3] A. Kush, �Security And Reputation Schemes In Ad-Hoc Networks Routing� International Journal of Information Technology and Knowledge Management, Volume 2, No. 1, pp 185-189, June 2009. [4] T. Karygiannis and L. Owens, �Wireless Network Security�, NIST Special Publication, pp 800-848, November 2002
. [5] Yonguang Zhang and Wenke Lee, �Intrusion detection in wireless ad-hoc networks�, In 6th International Conference on Mobile Computing and Networking (MOBICOM‟00), pp 275� 283, August 2000.
[6] A. Kush, C. Hwang and P. Gupta, �Secured Routing Scheme for Adhoc Networks� International Journal of Computer Theory and Engineering (IJCTE), Volume 3, pp 1793-1799, May 2009.
[7] P. Papadimitratos and Z. J. Haas, �Secure routing for mobile ad hoc networks�, SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), January 2002.
[8] Panagiotis Papadimitratos and Zygmunt J. Haas, �Secure message transmission in mobile ad hoc networks�, Elsevier Journal of Adhoc network, Ad Hoc Networks 1, pp 193�209, 2003.
[9] Fei Hu and Neeraj K. Sharma, �Security considerations in ad hoc sensor networks� Elsevier Journal of Ad hoc Networks, Ad Hoc Networks 3, pp 69�89, 2005.
[10] B. Dahill, B. N. Levine, E. Royer and C. Shields, �A secure routing protocol for ad hoc networks�, Technical Report UM-CS-2001-037, University of Massachusetts, Department of Computer Science, August 2001.