Please use this identifier to cite or link to this item:
http://dspace.dtu.ac.in:8080/jspui/handle/repository/20766
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | PANDEY, MANISH | - |
dc.date.accessioned | 2024-08-05T08:48:40Z | - |
dc.date.available | 2024-08-05T08:48:40Z | - |
dc.date.issued | 2024-05 | - |
dc.identifier.uri | http://dspace.dtu.ac.in:8080/jspui/handle/repository/20766 | - |
dc.description.abstract | Encryption is not a novel concept. Instead, it has been in use for thousands of years. The mathematical methods of data security, such as data integrity, secrecy, authentication, and data origin authentication, are studied in this field of study. However, encryption is nothing more than a bundle of methods for encrypting the data, sending it to the right recipient, and allowing this individual to easily decrypt it. In the papers, the methods vary, including numerical, chaos generator, and public key cryptography approaches, while their quality is assessed with statistical tests or through comparison with similar approaches. The articles also discuss the weaknesses and limitations of the methods and claim that some require more exploration to become secure from the attacks. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartofseries | TD-7284; | - |
dc.subject | DIFFIE-HELLMAN ALGORITHM | en_US |
dc.subject | STEGANOGRAPHY | en_US |
dc.subject | BISECTION METHOD | en_US |
dc.subject | NEWTON-RAPHSON METHOD | en_US |
dc.subject | ENCRYPTION | en_US |
dc.subject | CRYPTOGRAPHY | en_US |
dc.title | ENHANCED ENCRYPTION AND DECRYPTION BASED ON DIFFERENT NUMERICAL METHODS | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | M.E./M.Tech. Computer Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Manish Pandey M.Tech.pdf | 2.71 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.