Techniques for Secure Transmission by Bhardwaj, Abhishek

Techniques for Secure Transmission

Crypto has a long and exciting history. most do not complete technical description of Kahn of the...
CHF 41.95
CHF 41.95
SKU: 9787685243960
Product Type: Books
Please hurry! Only 0 left in stock
Author: Abhishek Bhardwaj
Format: Paperback
Language: English
Subtotal: CHF 41.95
10 customers are viewing this product
Techniques for Secure Transmission by Bhardwaj, Abhishek

Techniques for Secure Transmission

CHF 41.95

Techniques for Secure Transmission

CHF 41.95
Author: Abhishek Bhardwaj
Format: Paperback
Language: English

Crypto has a long and exciting history. most do not complete technical description of Kahn of the matter is the automatic code he [140], a cryptogram from its first use, limited, about 4,000 years ago, in the 20th century, for the Egyptian people. Kahn's novel, published in 1967, examines the most important elements of the story (so far) to develop the theme. Researchers have always tried to break old encryptions (ciphers) and show technological advancements. A simple cipher that was impossible to break in a human life 10 years ago can now be deciphered by brute force in minutes. Therefore, security must cope with regular advances in technology to protect information. Hence, this research is needful for the today life, so we study to plan on different types of existing and new techniques of cryptographic algorithms. Some researchers show that how cryptographic techniques have grown and improved with time. It shows the commencement of encryption in ancient history. In addition, how it grew in the present time. Some work is done in showing techniques of current times, which were used for information hiding. A reversible data hiding technique is used which is based on local histogram shifting and multiple layers of embedding the data. In addition, data hiding in image is taken to next level by performing dual image based data hiding technique. In current times, there are mainly two different classes of cipheres symmetric and asymmetric ciphers. DES, AES, IDEA, Rc5, Rc6 family, is symmetric cipheres; RSA, ElGamal are examples of asymmetric key cryptography Attacks can be easily controlled by elliptic curve cryptosystems (ECC). Proven encryption is another technique that targets the extended security algorithm. It is difficult to look at the modified classification algorithms, but there are some variables that can be considered for each class's cryptographic algorithms; to be more precise, time to encrypt, time to decrypt, recurrence table and basically protection. These testing objectives compare each class to a retention algorithm and which one is optimal. SAFE is drawn from proven encryption which, when performed in software, claims to be better than AES. RSA is derived from asymmetric key cryptography, which is the first of its kind and is now known as one of the best algorithms for xxii encryption. Each of these algorithms has been implemented for the first time using the IR language and the results are compared with the search for the best results in time and safety. The studies proposed in the thesis investigate the various aspects of existing and new systems under these headings in different chapters. The study of different cryptographic techniques from past to future and its challenges; to implement the ChaCha stream cipher used in this algorithm and its impact; to compare the RSA, Triple-DES, AES to SAFE proposed algorithms; to Analyze the Performance of "Proposed Sponge Function based Authentication Encryption technique (SAFE) using robust initialization vector and its impact. The research tries to present adequate contrast between the most popular algorithms used in the field of data encryption with our algorithm proposed in the past in this chapter 1 and 2. Since the efficiency of these algorithms in various technical configurations as described in chapter 3, which is our main concern in this case. The comparison presented algorithm takes into account the analysis of behavior and performance when different data loads were shown in chapter 5. In addition, chapter 6 explains about the results and comparison of speed and security between proposed algorithm "SAFE" and security algorithms currently in trend such as AES, DES, TDES, RSA, etc. And last chapter present brief conclusion



Author: Abhishek Bhardwaj
Publisher: Abhishek Bhardwaj
Published: 09/28/2022
Pages: 196
Binding Type: Paperback
Weight: 0.59lbs
Size: 9.00h x 6.00w x 0.42d
ISBN: 9787685243960

Returns Policy

You may return most new, unopened items within 30 days of delivery for a full refund. We'll also pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.).

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, simply login to your account, view the order using the "Complete Orders" link under the My Account menu and click the Return Item(s) button. We'll notify you via e-mail of your refund once we've received and processed the returned item.

Shipping

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.

When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Related Products

Recently Viewed Products