An Efficient And Secure Cryptography Techniques Usingunimodular Matrix

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1

Abstract

Abstract: In day to day life, transmission of data from sender to receiver with security is very difficult. "Cryptography" is one of the famous techniques which provide security for confidential data. Cryptography is one of the best techniques for the secure data transmission. Confidentiality of data, access control and nonrepudiation are the main goals of cryptography. The existing system is having limitations related to decrypts of Armstrong numbers. But the algorithm used in the proposed method uses unimodular matrix for encryption. Therefore, access control, non-repudiation and confidentiality of data is maintained.

Authors and Affiliations

ApurvaK. Vangujar , Kajal Agrawal

Keywords

Related Articles

 Penetration Testing for Android Smartphones

 One major challenge faced by Android users today is the security of the operating system especially during setup. The use of smartphones for communication, social networking, mobile banking and payment systems ha...

 Improving Sales in SME Using Internet Marketing

 In Indonesia, SMEs are the backbone of the Indonesian economy. Number of SMEs until 2011 to reach around 52 million. SMEs in Indonesia is very important for the economy because it accounts for 60% of  GDP an...

Personal Financial Assistant

Abstract: Managing our finances has always been an important part of our life. While it is easy to let situation define our expenses, it becomes exceedingly difficult to keep track of all the spending, and is not very ap...

 Analysis of C4.5 and K-Nearest Neighbor (KNN) Method on Algorithm of Clustering For Deciding Mainstay Area

 Development as a sustainable activity needs a good plan, so the programs can be effective and have a clear objective. Therefore, a model to help the analysis is significantly needed in determining the priority area...

Duplicate Detection in Hierarchical Data Using XPath

Abstract: There were many techniques for identifying duplicates in relational data, but only a few solutions focus on identifying duplicates which has complex hierarchical structure, as XML data. In this paper, we presen...

Download PDF file
  • EP ID EP138481
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

ApurvaK. Vangujar, Kajal Agrawal (2016). An Efficient And Secure Cryptography Techniques Usingunimodular Matrix. IOSR Journals (IOSR Journal of Computer Engineering), 18(1), 19-22. https://europub.co.uk./articles/-A-138481