Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6542
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSingh, Mudit-
dc.contributor.authorSingh, Amit Kumar [Guided by]-
dc.date.accessioned2022-09-23T08:48:46Z-
dc.date.available2022-09-23T08:48:46Z-
dc.date.issued2015-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6542-
dc.description.abstractThe future of the Internet, especially in expanding the range of applications, involves a much deeper degree of privacy, and authentication. Without these the Internet cannot be properly used to replace existing applications such as in voting, finance, and so on. Many people are not aware that the information they send or the files stored on their computers needs to be protected, however when you consider what you have on your computer and the many ways it can fall into the wrong hands, it does start to make sense to protect your privacy in some way. The future is thus towards data encryption which is the science of cryptography , and provides a mechanism for two entities to communicate without any other entity being able to read their messages. This report illustrates how to encrypt a text and to decrypt the encrypted form of the text to get the original input text. This encryption and decryption is done using a derived form of the most widely used private key encryption scheme based on data encryption standard, Triple DES (3-DES).en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectAlgorithmen_US
dc.subjectAsymmetric Cipheren_US
dc.subjectData encryption standarden_US
dc.titleTriple Data Encryption Standarden_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Triple Data Encryption Standard.pdf3.99 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.