Meticulous Tasks of Various Cryptographic Techniques in Secure Communications

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 5, Issue 4

Abstract

Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and provides in-depth analysis of these techniques. This paper also provides a discussion of how the two related fields of encryption and hash functions are complementary, not replacement technologies for one another.

Authors and Affiliations

Dr. P. Ramesh Babu , D. Nagamalleswara Rao , Hunde Merga Dugassa , Abebe Gemeda

Keywords

Related Articles

Image Search Reranking

The existing methods for image search re ranking suffer from the unfaithfulness of the as sumptions under which the text-based images search result. The resulting images contain more irrelevant images. Hence the re ranki...

Real Time Detection of Odd Behavior and Irrelevant Promotion in Video Sharing Systems

Metacafe is one of the most popular video sharing system among all online video sharing systems, these video sharing systems provide features that allow users to post a video as a response to the topic that is being disc...

Wireless Sensor Based Remote Monitoring System For Fluoride Affected Areas Using GPRS and GIS

Recent developments in the availability of low-cost integrated General Packet Radio Service (GPRS)/Global Positioning Systems (GPS) modem and publically available web based Geographical Information Systems (GIS)have enab...

Optimizing Resource Allocation in IAAS Clouds

Cloud computing is a phenomenon which bestows new model of computing. It has various service modes. The service model which provides on-demand access to computing resources is known as infrastructure-as-a-service (IaaS)....

Literature Survey on Preference Database

Preference data base (Pref DB) used to provide appropriate recommendations to the users on their relevant search and preferences. The design is made such that user interested data is obtained from the database. PrefDB us...

Download PDF file
  • EP ID EP146757
  • DOI -
  • Views 118
  • Downloads 0

How To Cite

Dr. P. Ramesh Babu, D. Nagamalleswara Rao, Hunde Merga Dugassa, Abebe Gemeda (2013). Meticulous Tasks of Various Cryptographic Techniques in Secure Communications. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 5(4), 214-220. https://europub.co.uk./articles/-A-146757