CRYPTOGRAPHY

HOME           ABOUT US        CONTACT





Good cryptography requires good random numbers. Almost all cryptography protocols require the generation and use of secret values that must be unknown to attackers. A RNG for cryptography applications should appear to computationally bounded adversaries to be close as possible to a perfect RNG.....................
TO GET FULL PAPER : Click here








Cryptography has a long and colourful history. Historically, four groups of people have used and contributed to the art of cryptography; the military, the diplomatic corps, diarists, and lovers. Of these the military has had the most important role and has shaped the field................
TO GET FULL PAPER : Click here








Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto provides. As companies build Virtual Private Networks, demand secure communications and require stronger authentication techniques, more and more applications are built with crypto as core components..................
TO GET FULL PAPER : Click here







This paper describes briefly the techniques of cryptography with the help of some algorithms like two fish and some other techniques like smart cards. Cryptography makes it possible to keep data secure over an insecure network. Cryptography is the process or skill of communicating in secret writing also known as encryption....................
TO GET FULL PAPER : Click here





The present century has been one of many scientific discoveries and technological advancements. With the advent of technology came the issue of security. As computing systems became more complicated, there was an increasing need for security...............
TO GET FULL PAPER : Click here