Cryptography: From The Ancient History to Now, It’s Applications and a New Complete Numerical Model (Published)
In this computer and internet based modern era, people have to deal with private information in thousands way. Today’s prime concern is to keep secure the information of different channel and medium related to one’s and to communicate securely, and to do so cryptography method is the sole key to it. This research paper will briefly lighten on the history of cryptography, basic definitions related to cryptography and some basic theorems to build different types of cryptography models. This research paper will propose few propositions based on solvability equation and will introduce a solvability series. From ancient time to now there are several cryptographic models are invented. This research paper will present a new type of complete model of cryptography with the help of a modified solvability proposition and solvability series, different from others.
A Framework for Security of Data in Telemedicine (Published)
One of the challenges of telemedicine as observed in the literature is the issue of insecurity of data. This has come with its attendant lack of confidentiality and data integrity, the attributes most needed in medical records. An attempt to proffer solution to this problem is in the design of a framework comprising Rivest, Shamir and Adleman (RSA) cipher combined with the F4 frequency domain steganography algorithm. The framework is demonstrated with a simulated scenario. Complicated though this integration seems to be, the foolproof security offered outweighs the computational complexity.
Wireless Sensor Network (WSN) assists to communicate with limited frequency and bandwidth through the group of independent nodes. WSN has an extensive application in both industrial and commercial areas to manage peril environments incorporating nuclear power plants and wilderness areas. Cryptography is used for writing secret code and it is an ancient technique. Moreover Cryptography is required in data and telecommunications in order to communicate with unreliable medium especially in the internet. Cryptography technique is classified in several ways but for this paper, the technique will be classified on the basis of number of keys used for decryption and encryption. Elliptic Curve Cryptography is an efficient technique in providing security solution for wireless networks. As compared with traditional public key cryptography such as RSA, eclipse curve cryptography attains better result in providing security services. The findings reported that the newly developed protocol was more scalable, less weight and required less memory compared to symmetric based cryptography. This paper concludes that Cryptography is one such technique to confront security problems in WSN. However cryptography alone is not enough to confront WSN problems. It is essential to use the key management process carefully in order to achieve higher security system networks