Indian Journal of Science and Technology
Year: 2019, Volume: 12, Issue: 48, Pages: 1-4
Rajkumar N.1, Janhavi V.2 and A.B. Rajendra3,*
1 Accendere Knowledge Management Service Pvt Ltd, New Delhi, India
2 Department of Computer Science and Engineering, Vidyavardhaka College of Engineering, Mysuru, Karnataka, India
3 Department of Information Science and Engineering, Vidyavardhaka College of Engineering, Mysuru, Karnataka, India;
Objective: This study analyses out of exchanging security information. There is a strong requirement for access to various concentrations of delicate information at the edge; however, there is a greater danger than the key business setting at that place. Methods: This study explores the demands, technologies, and methods of threat mitigation to safely share information with the tactical user while preserving data and information systems from intruders and malware. Findings/ application: The new cryptography policy architecture requires to eliminate the architecture of stovepipe and free the accesses to communicate data across traditional and non-traditional field limits.
Keywords: Cryptography, Encryption, Decryption, Trust
Subscribe now for latest articles and news.