High Security by using Triple Wrapping Feature and their Comparison

Article ID

CSTIT2FOX9

High Security by using Triple Wrapping Feature and their Comparison

Pooja Lal Mundaniya
Pooja Lal Mundaniya College of Technology And Engineering
Naveen Choudhary
Naveen Choudhary
DOI

Abstract

In the age of information, cryptography is a predominant obligation for the security of our documents. Cryptography inclusive of authentication, integrity, confidentiality and non-repudiation has lot to offer. To protect users’ information and their data from being attacked, encryption and digital signature algorithms could be utilized with distinct approaches to administer secure network and security solutions. In the current scenario, encryption alone cannot withstand the novel attacks; for notable security, we require encryption with digital signature. In this paper symmetric, asymmetric algorithm and digital signature techniques are proposed to elevate security. ElGamal encryption algorithm, ElGamal digital signature algorithm and IDEA algorithms are employed in the proposed methodology.

High Security by using Triple Wrapping Feature and their Comparison

In the age of information, cryptography is a predominant obligation for the security of our documents. Cryptography inclusive of authentication, integrity, confidentiality and non-repudiation has lot to offer. To protect users’ information and their data from being attacked, encryption and digital signature algorithms could be utilized with distinct approaches to administer secure network and security solutions. In the current scenario, encryption alone cannot withstand the novel attacks; for notable security, we require encryption with digital signature. In this paper symmetric, asymmetric algorithm and digital signature techniques are proposed to elevate security. ElGamal encryption algorithm, ElGamal digital signature algorithm and IDEA algorithms are employed in the proposed methodology.

Pooja Lal Mundaniya
Pooja Lal Mundaniya College of Technology And Engineering
Naveen Choudhary
Naveen Choudhary

No Figures found in article.

Pooja Lal Mundaniya. 2015. “. Global Journal of Computer Science and Technology – H: Information & Technology GJCST-H Volume 15 (GJCST Volume 15 Issue H2): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
GJCST-H Classification: D.4.6
Keywords
Article Matrices
Total Views: 7958
Total Downloads: 2014
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

High Security by using Triple Wrapping Feature and their Comparison

Pooja Lal Mundaniya
Pooja Lal Mundaniya College of Technology And Engineering
Naveen Choudhary
Naveen Choudhary

Research Journals