Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Robust Elliptical Based Security using Cryptography Technique


     

   Subscribe/Renew Journal


With the increase of networked electronic communication came overwhelming capabilities to collect, process, combine and store data, resulting in previously unseen transformational pressure on the concepts of trust, security and privacy as we know them. In the Future all the work will be made digitalized. Technology development for data linking and mining, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity lie at the basis of many human interactions and transactions, and societies have developed legitimate concern for privacy being essential for freedom and creativity. The up-and-coming development of the Information Society shows the readiness to respond to the transformational change evoked by ICT. We have reached the eleventh hour for the safeguarding of trust and privacy as elements that can be transposed into our digital future. The Cryptography plays major role in securing data while transmission. There are several cryptographic techniques introduced to secure data in the current world. In future the technology may improve in such a way that the current cryptographic technique may enhance the security of the data. Hence the cryptographic requirements must also be improved.


Keywords

Cryptography, Unauthorized, Elliptical Curve, UNICODE.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 317

PDF Views: 3




  • A Robust Elliptical Based Security using Cryptography Technique

Abstract Views: 317  |  PDF Views: 3

Authors

Abstract


With the increase of networked electronic communication came overwhelming capabilities to collect, process, combine and store data, resulting in previously unseen transformational pressure on the concepts of trust, security and privacy as we know them. In the Future all the work will be made digitalized. Technology development for data linking and mining, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity lie at the basis of many human interactions and transactions, and societies have developed legitimate concern for privacy being essential for freedom and creativity. The up-and-coming development of the Information Society shows the readiness to respond to the transformational change evoked by ICT. We have reached the eleventh hour for the safeguarding of trust and privacy as elements that can be transposed into our digital future. The Cryptography plays major role in securing data while transmission. There are several cryptographic techniques introduced to secure data in the current world. In future the technology may improve in such a way that the current cryptographic technique may enhance the security of the data. Hence the cryptographic requirements must also be improved.


Keywords


Cryptography, Unauthorized, Elliptical Curve, UNICODE.