Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/20766
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPANDEY, MANISH-
dc.date.accessioned2024-08-05T08:48:40Z-
dc.date.available2024-08-05T08:48:40Z-
dc.date.issued2024-05-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/20766-
dc.description.abstractEncryption is not a novel concept. Instead, it has been in use for thousands of years. The mathematical methods of data security, such as data integrity, secrecy, authentication, and data origin authentication, are studied in this field of study. However, encryption is nothing more than a bundle of methods for encrypting the data, sending it to the right recipient, and allowing this individual to easily decrypt it. In the papers, the methods vary, including numerical, chaos generator, and public key cryptography approaches, while their quality is assessed with statistical tests or through comparison with similar approaches. The articles also discuss the weaknesses and limitations of the methods and claim that some require more exploration to become secure from the attacks.en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD-7284;-
dc.subjectDIFFIE-HELLMAN ALGORITHMen_US
dc.subjectSTEGANOGRAPHYen_US
dc.subjectBISECTION METHODen_US
dc.subjectNEWTON-RAPHSON METHODen_US
dc.subjectENCRYPTIONen_US
dc.subjectCRYPTOGRAPHYen_US
dc.titleENHANCED ENCRYPTION AND DECRYPTION BASED ON DIFFERENT NUMERICAL METHODSen_US
dc.typeThesisen_US
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
Manish Pandey M.Tech.pdf2.71 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.