CUET DIGITAL REPOSITORY

Agent Command Manipulation System Using Two Keys Encryption Model

Show simple item record

dc.contributor.author Sohana, Sarah
dc.contributor.author Mukta, Rahma Bintey Mufiz
dc.date.accessioned 2024-07-03T02:42:57Z
dc.date.available 2024-07-03T02:42:57Z
dc.date.issued 2016-05-13
dc.identifier.isbn 978-1-5090-1268-8
dc.identifier.uri http://103.99.128.19:8080/xmlui/handle/123456789/443
dc.description The ICIEV provides vibrant opportunities for researchers, industry practitioners and students to share their research experiences, research results, ideas, review of various aspects and practical development experiences on Informatics, Electronics, Computer Vision and related fields. Through various presentations from peer-reviewed accepted papers, Special Talks and networking - the ICIEV provides the avenue to share knowledge, make networks, and develop a community for the new researchers - based on the experiences of experts. The ICIEV will open doors for challenging research areas for future. The ICIEV welcomes you to be part of it - through offering Special Session, Tutorial, Workshop, Special Talk, Panel Discussion, and through submitting your research paper on and related arenas! en_US
dc.description.abstract Cryptography plays a vital role in information security system against malicious attacks. This security system uses some algorithms to scramble data into scribbled text which can only be decrypted by party those possess the associated key. Keys play the most important role in ensuring security of those algorithms. A two keys based method which uses AES as core algorithm is proposed here. This improved method has been developed as application on Android platform which allows the user to encrypt confidential messages before it is transmitted over the network. This application provides a secure, fast and strong encryption of data. There is a huge amount of confusion and diffusion of data during encryption that makes it very hard for an intruder to interpret the encryption pattern and the plain text form of the encrypted data. Comparison between the proposed system and traditional systems show that the proposed one provides enhanced security in data transmission with good performance. en_US
dc.description.sponsorship IEEE, IEEJ, JSME, IEEE Computer Society en_US
dc.language.iso en_US en_US
dc.publisher IEEE en_US
dc.relation.ispartofseries ICIEV;
dc.subject cryptography en_US
dc.subject encryption en_US
dc.subject keys en_US
dc.subject symmetric key encryption en_US
dc.subject AES en_US
dc.subject DES en_US
dc.subject Tripple DES en_US
dc.subject security en_US
dc.title Agent Command Manipulation System Using Two Keys Encryption Model en_US
dc.title.alternative 5th International Conference on Informatics, Electronics & Vision (ICIEV-2016) en_US
dc.title.alternative ICIEV-2016 en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account