Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6542
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Singh, Mudit | - |
dc.contributor.author | Singh, Amit Kumar [Guided by] | - |
dc.date.accessioned | 2022-09-23T08:48:46Z | - |
dc.date.available | 2022-09-23T08:48:46Z | - |
dc.date.issued | 2015 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6542 | - |
dc.description.abstract | The future of the Internet, especially in expanding the range of applications, involves a much deeper degree of privacy, and authentication. Without these the Internet cannot be properly used to replace existing applications such as in voting, finance, and so on. Many people are not aware that the information they send or the files stored on their computers needs to be protected, however when you consider what you have on your computer and the many ways it can fall into the wrong hands, it does start to make sense to protect your privacy in some way. The future is thus towards data encryption which is the science of cryptography , and provides a mechanism for two entities to communicate without any other entity being able to read their messages. This report illustrates how to encrypt a text and to decrypt the encrypted form of the text to get the original input text. This encryption and decryption is done using a derived form of the most widely used private key encryption scheme based on data encryption standard, Triple DES (3-DES). | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Algorithm | en_US |
dc.subject | Asymmetric Cipher | en_US |
dc.subject | Data encryption standard | en_US |
dc.title | Triple Data Encryption Standard | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Triple Data Encryption Standard.pdf | 3.99 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.