ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Research Article Open Access

Cryptography and its two Implementation Approaches

Abstract

Abstract:In the modern digital world inviolability of the crucial facts is an essential part for data security. The entire world becoming a village due to the digital data conveys through network of networks called internet. With availability of network everywhere the common man perform transactions such as buying and selling the products called ecommerce, cash submission and withdrawal from bank with the help of e-banking etc. Network may be insecure where the people transmitting their decisive data, valuable information in the form of conspicuous passwords etc. Third parties like hackers who do not have the authority can hack the data. They can destroy confidentiality of the facts, integrity of the facts as well as availability ofthe facts. To prevent this, cryptography must be there. In this paper we will discuss about the cryptography and its two implementation approaches Known as Peer to Peer (P2P) Trusted Third Party Cryptography Approaches which is based upon Client Server Computing.

Gagandeep shahi, Charanjit singh

To read the full article Download Full Article | Visit Full Article