Secure Communication using Symmetric and Asymmetric Cryptographic Techniques

Автор: Omar M.Barukab, Asif Irshad Khan, Mahaboob Sharief Shaik , MV Ramana Murthy, Shahid Ali Khan

Журнал: International Journal of Information Engineering and Electronic Business(IJIEEB) @ijieeb

Статья в выпуске: 2 vol.4, 2012 года.

Бесплатный доступ

Satellite based communication is a way to transmit digital information from one geographic location to another by utilizing satellites. Satellite as communication medium to transfer data vulnerable various types of information security threat, and require a novel methodology for safe and secure data transmission over satellite. In this paper a methodology is proposed to ensure safe and secured transferred of data or information for satellite based communication using symmetric and asymmetric Cryptographic techniques.

Satellite based communication, Information security , Encryption, Cryptographic Algorithms

Короткий адрес: https://sciup.org/15013121

IDR: 15013121

Список литературы Secure Communication using Symmetric and Asymmetric Cryptographic Techniques

  • s. Subasree and N. K. Sakthivel,, "Design of a new security protocol using hybrid cryptography algorithms", IJRRAS, vol. 2, 2010.
  • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Proc. Workshop on Cryptographic Hardware and Embedded Syst., M. Joye and J.-J. Quisquater, Eds. New York: Springer-Verlag, 2004, vol. 3156, Lecture Notes in Computer Science, pp. 357–370.
  • Eun-Kyung Ryu, Tsuyoshi Takagi, "A hybrid approach for privacy-preserving RFID tags",Computer Standards & Interfaces, Elsevier, 31, pp. 812–815, 2010.
  • H. S. Majunatha Reddy, & K B Raja, "HIGH CAPACITY AND SECURITY STEGANOGRAPHY USINGDISCRETE WAVELET TRANSFORM", International Journal of Computer Science and Security (IJCSS), Vol. 3: Issue (6) pp 462-472.
  • Md. S. Khan, M V. V. Bhaskar, M V S. Nagaraju, "An Optimized Method for Concealing Data using Audio Steganography", International Journal of Computer Applications (0975 – 8887) Vol. 33– No.4, pp 25-30. 2011
  • J. Baek, R. Steinfeld and Y. Zheng, "Formal Proofs for the Security of Signcryption", Proc. PKC , Vol. 2274 of LNCS, Springer- Verlag, pp 80-98, 2002.
  • J. Baek, R. Steinfeld and Y. Zheng," Formal Proofs for the Security of Signcryption", a full version, submitted to Journal of Cryptology. A draft is available upon request to the authors.
  • J. Baek and Y. Zheng, "Description of Provably Secure Signcryption Schemes", Retrieved on 21-03-2012 from http://www.signcryption.org/publications/pdffiles/yz-baek-sc-description-02.pdf, Aug 2002.
  • Mac OS X Developer Library, "Security Overview", Retrieved on March 18th 2012 from, http://developer.apple.com/library/mac/#documentation/Security/Conceptual/Security_Overview /CryptographicServices/CryptographicServices.html
  • A. Brandt and A. Krasne, "How It Works: Encryption hides your data from prying eyes. Learn how it works and what you need to use it", Retrieved on March 18th 2012 from, http://www.pcworld.com/article/15230/how_it_works_encryption.html
  • Singh , S. Code "The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography", Doubleday, 1999
  • Schneier B.,"Applied Cryptography", John Wiley New York
  • Andrew s Tanebbaum, computer Networks, Third edition, Prentice-Hal inc, New Delhi, India 1999
  • Stallings, W, "Cryptography and Network Security: Principles and practice", 2nd edition, prentice hall
  • Diffe,W , Hellman, M , "New directions in cryptography", IEEE Trans, inform. Theory, 1996
  • RL,Rivest et al , "A method for obtaining digital signatures and public-key crypto systems", 2000
  • Rabin, M, "Probabilistic algorithms, In Algorithms and complexity", Academic Press, New York, 1986.
Еще
Статья научная