Methods for Protection of Key in Private Key Cryptography

Authors

  • Neha Tyagi Assistant Professor, Department of Computer Science & Engineering, G.L. Bajaj Institute of Technology & Management, Greater Noida, Uttar Pradesh, India. Author
  • Ashish Agarwal Student (B.Tech.), Department of Computer Science & Engineering, G.L. Bajaj Institute of Technology & Management, Greater Noida, Uttar Pradesh, India. Author
  • Anurag Katiyar Student (B.Tech.), Department of Computer Science & Engineering, G.L. Bajaj Institute of Technology & Management, Greater Noida, Uttar Pradesh, India. Author
  • Shubham Garg Student (B.Tech.), Department of Computer Science & Engineering, G.L. Bajaj Institute of Technology & Management, Greater Noida, Uttar Pradesh, India. Author
  • Shudhanshu Yadav Science & Engineering, G.L. Bajaj Institute of Technology & Management, Greater Noida, Uttar Pradesh, India. Author

Keywords:

Hybrid cryptography, Security threats,, Private Key cryptography, Public key cryptography, Cryptography, Encryption, Key, R.S.A, algorithm

Abstract

 The susceptible nature of information against  forthcoming threats has become a ponderous affair for the  professionals of this field. It is a result of the rational and  steady struggle by the carrying people that has produced  multiple approaches which shields vital information from  speculated security attacks. For the everyday users who are  unfamiliar of these potential incursion(s) to their intimate  information, feel helpless when they encounter persecutor(s)  who wish to exploit the confidentiality of this elemental  information. Here we have discussed about a distinctive  approach which deal with these upcoming attacks. We have  tried to produce an algorithm which will safeguard users  against objectionable invasion of reserved information. We  have incorporated a set of diverse techniques to produce an  algorithm which is immune to these incursions. These  methods interpolate perceptions like Hybrid cryptography  [3], R.S.A. algorithm [1], Key management, Hash functions or  Encrypted key exchange. 

Downloads

Download data is not yet available.

References

NehaTyagi, AshishAgarwal, AnuragKatiyar, ShubhamGarg, ShudhanshuYadav, “Protection of Key in Private Key Cryptography” published by “International Journal of Advanced Research”, Volume 5, Issue 2, Feb 2017.

ArpitAgrawal, GunjanPatankar,”Design of Hybrid Cryptography Algorithm for Secure Communication” published by “International Research Journal of Engineering and Technology”, Volume 3 Issue 1, Jan 2016.

Meenakshi Shankar, Akshay.P, “Hybrid Cryptographic Techniques Using RSA Algorithm and Scheduling Concepts” published by ”International Journal of Network Security & Its Application”, Volume 6, Issue 6, Nov 2014.

Downloads

Published

2024-03-04

How to Cite

Methods for Protection of Key in Private Key Cryptography . (2024). International Journal of Innovative Research in Computer Science & Technology, 5(2), 239–241. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13496