Indian Journal of Science and Technology
DOI: 10.17485/ijst/2013/v6i12.12
Year: 2013, Volume: 6, Issue: 12, Pages: 1-5
Original Article
P. M. Durai Raj Vincent1*, Syed Amber Iqbal2 , Karan Bhagat2 and Kamal Kant Kushwaha2
1 Assistant Professor (Senior), [email protected]
2 III B.Tech(IT), SITE, [email protected]
[email protected]
[email protected]
*Author For Correspondence
P. M. Durai Raj Vincent
ssistant Professor (Senior),
Email: [email protected]
Networking is a way of connecting geographically distributed devices so as to communicate and share resources such as printers, files etc. Nowadays, Networking is extensively used in banking sector, e–commerce, social networking sites, news groups, sharing of software, sharing of valuable information among others and so many more. The unauthorized access to these networks is restrained by the administrator who apply and use various provisions and policies which is termed as network securities. Network security refers to any activity designed to protect network. Network security is an extremely valuable and procreative amenity. A threat exists whenever the security is perceived to get breached and vulnerability likely to be exploited. To enhance and strengthen a safeguard mechanism in protecting information multiple layers of security are implemented in our algorithm instead of adopting a single layer which at times may fall through.
Keywords: Transposition, Randomization, Quadratic Encryption, Hash Code, Cryptography
Subscribe now for latest articles and news.