Documente Academic
Documente Profesional
Documente Cultură
http://www.iaeme.com/IJCET/index.asp
36
editor@iaeme.com
Artificial Neural Cryptography Datagram Hiding Techniques For Computer Security Objects
Register
1. INTRODUCTION
Cryptography is the art or science of keeping messages secret suppose that someone
wants to send a message to a receiver, and wants to be sure that no-one else can read
the message. However, there is the possibility that someone else opens the letter or
hears the electronic communication. In cryptographic terminology, the message is
called plaintext or cipher text. Encoding the contents of the message in such a way
that hides its contents from outsiders is called encryption. The encrypted message is
called the cipher text. The process of retrieving the plaintext from the cipher text is
called decryption. Encryption and decryption usually make use of a key, and the
coding method is such that decryption can be performed only by knowing the proper
key.
A method of encryption and decryption is called a cipher. Some cryptographic
methods rely on the secrecy of the algorithms; such algorithms are only of historical
interest and are not adequate for real-world needs. All modern algorithms use a key to
control encryption and decryption; a message can be decrypted only if the key
matches the encryption key.
There are two classes of key-based encryption
algorithms, symmetric (or secret-key) and asymmetric (or public-key) algorithms. The
difference is that symmetric algorithms use the same key for encryption and
decryption (or the decryption key is easily derived from the encryption key).
The Advanced Encryption Standard (AES) specifies a FIPS-approved
Cryptographic algorithm that can be used to protect electronic data. The AES
algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt
(decipher) information. Encryption converts data to an unintelligible form called
cipher text; decrypting the cipher text converts the data back into its original form,
called plaintext.
The AES algorithm is capable of using cryptographic keys of 128, 192, and 256
bits to encrypt and decrypt data in blocks of 128 bits. The algorithm specified in this
standard may be implemented in Software, firmware, hardware, or any combination
thereof. The specific implementation may depend on several factors such as the
application, the environment, the technology used, etc. The algorithm shall be used in
conjunction with a FIPS approved or NIST recommended mode of operation. Object
Identifiers (OIDs) and any associated parameters for AES used in these modes are
available at the Computer Security Objects Register (CSOR), located at
Implementations of the algorithm that are tested by an accredited laboratory and
validated will be considered as complying with this standard. Since cryptographic
security depends on many factors besides the correct implementation of an encryption
algorithm, Federal Government employees, and others, should also refer to NIST
Special Publication 800-21 for additional information and guidance
http://www.iaeme.com/IJCET/index.asp
37
editor@iaeme.com
http://www.iaeme.com/IJCET/index.asp
38
editor@iaeme.com
Artificial Neural Cryptography Datagram Hiding Techniques For Computer Security Objects
Register
http://www.iaeme.com/IJCET/index.asp
39
editor@iaeme.com
http://www.iaeme.com/IJCET/index.asp
40
editor@iaeme.com
Artificial Neural Cryptography Datagram Hiding Techniques For Computer Security Objects
Register
http://www.iaeme.com/IJCET/index.asp
41
editor@iaeme.com
4. CONCLUSION
This Cryptography Datagram Hiding Techniques Based on Computer Security
Objects Register research paper is very useful to keep the secret message safely
without reading the content by the others. It maintains the logical security. These
algorithms are only of historical interest and are not adequate for real-world needs of
security by hiding the secret codes without worrying about any one reading of the
contents. We conclude that this research work will be helpful for Army Defense
forces and public commercial purposes.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
http://www.iaeme.com/IJCET/index.asp
42
editor@iaeme.com
Artificial Neural Cryptography Datagram Hiding Techniques For Computer Security Objects
Register
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
http://www.iaeme.com/IJCET/index.asp
43
editor@iaeme.com