• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology


Indian Journal of Science and Technology

Year: 2016, Volume: 9, Issue: 17, Pages: 1-6

Original Article

Password Verification in Military Networks by using Secure Hash Algorithm


Objectives: The main objective is to provide security for confidential information by exploiting external storage nodes applications for mobile nodes in military environments by using secure hash algorithm. Methods and analysis: In military environments we are having measure partitions like a parcel or a hostile region. There is no doubt at all they suffer from intermittent network property. They are having frequent partitions. Disruption-tolerant network DTN technologies are may be a true and simple solutions. DTN is a Disruption-tolerant network. Findings: These devices take the counseling or control dependably by extending memory module nodes. In these networking environments DTN is extremely successful technology. Once there’s no wired affiliation in between supply and destination device, data from supply node need to wait within middle nodes for oversized quantity for your duration until the affiliation would be properly established. One amongst the difficult approach may be a ABE. That’s attribute-based coding that fulfill the requirements to get secure data extraction through DTNs.Here the conception is Cipher text Policy ABE (CP-ABE).Improvement: It provides the applicable means of coding of knowledge. The coding includes the dataset that the secret writing must possess so as to decrypt the cipher text. Hence, different type of users may be given to decrypt complete different components of knowledge in line with the safety policy

Keywords: CP-ABE, DTN, Military Networks, Password, Secure Hash Algorithm


Subscribe now for latest articles and news.