Research Article

Secured Wireless Data Communication

by  Dnyanda Namdeo Hire
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 54 - Issue 1
Published: September 2012
Authors: Dnyanda Namdeo Hire
10.5120/8532-2064
PDF

Dnyanda Namdeo Hire . Secured Wireless Data Communication. International Journal of Computer Applications. 54, 1 (September 2012), 27-30. DOI=10.5120/8532-2064

                        @article{ 10.5120/8532-2064,
                        author  = { Dnyanda Namdeo Hire },
                        title   = { Secured Wireless Data Communication },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 54 },
                        number  = { 1 },
                        pages   = { 27-30 },
                        doi     = { 10.5120/8532-2064 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Dnyanda Namdeo Hire
                        %T Secured Wireless Data Communication%T 
                        %J International Journal of Computer Applications
                        %V 54
                        %N 1
                        %P 27-30
                        %R 10.5120/8532-2064
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of data and new algorithms are evolving. Polyalphabetic substitution cipher is a strong algorithm used for security of data in army stations. In this paper, various techniques of security of data and one the algorithm using polyalphabetic substitution cipher are discussed.

References
  • A. S. Tanenbaum, "Computer Networks", 2nd Edition, PHI.
  • http://www. cryptojinas. com-information of cryptography
  • William Stallings, "Cryptography and Network Security", 3rd Edition, Pearson Education.
  • Evangelos Kranakis, "Primality and Cryptography", John Wiley & Sons.
  • Douglas A. Stinson, "Cryptography, Theory and Practice", 2nd Edition, Chapman & Hall, CRC Press Company, Washigton.
  • http://www. truecrypt. org
  • B. B. Edwards Jr. Master Keying by the Numbers (2/e). Security Resources. Pensacola, FL, USA. 1997.
  • B. W. Lampson. "Hints for computer system design. " ACM Operating Systems Rev. 15, 5 (Oct. 1983),pp 33-48.
  • M. W. Tobias. Locks, Safes and Security (2/e). Charles Thomas Publisher, Ltd. Springfield, IL, USA. 2000.
  • J. Andrews. Fundamentals of Master Keying. Associated Locksmiths of America. 1990.
  • Matt Blaze Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks, AT&T Labs – Research, IEEE Security and Privacy, March/April 2003.
  • http://www. freeotfe. org
  • Andrews, M. , and Whittaker, J. "Computer Security. " IEEE Security and Privacy, September/October 2004.
  • National Institute of Standards and Technology. An Introduction to Computer Security: The NIST Handbook. Special Publication 800-12, October 1995.
  • Gardner, M. Codes, Ciphers, and Secret Writing. New York: Dover, 1972.
  • Garrett, P. Making, Breaking Codes: An Introduction to Cryptology. Upper Saddle River, NJ: Practice Hall, 2001.
  • http://www. hpccsystems. com
  • Kahn, D. The Codebreakers: The Story of Secret Writing. New York: Scribner, 1996.
  • Korner, T. The Pleasures of Counting. Cambridge, England: Cambridge University Press, 1996.
  • Kumar, I. Cryptology. Laguna Hills, CA: Aegean Park Press, 1997.
  • Nichols, R. Classical Cryptography Course. Laguna Hills, CA: Aegean Park Press, 1996.
  • Nichols, R. , ed. ICSA Guide to Cryptography. New York: McGraw-Hill, 1999.
  • Sinkov, A. Elementary Cryptanalysis: A Mathematical Approach. Washington, D. C. : The Mathematical Association of America, 1966.
  • http://www. cryptool. com
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cryptography Encryption Decryption

Powered by PhDFocusTM