Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7961
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gandhi, Shivi | - |
dc.contributor.author | Srivastava, Aditya | - |
dc.contributor.author | Lucktoo, Ashmita | - |
dc.contributor.author | Gupta, Kanika | - |
dc.contributor.author | Ghrera, Satya Prakash [Guided by] | - |
dc.date.accessioned | 2022-10-19T06:31:54Z | - |
dc.date.available | 2022-10-19T06:31:54Z | - |
dc.date.issued | 2013 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7961 | - |
dc.description.abstract | Today, security is one of the foremost concerns in the transmission of data over the internet or over any other network. We will thus develop applications to implement various security services that will help the individuals in the network to maintain their safety and privacy. Also, the strength of these security solutions will be cryptanalyzed through study of various networking attacks and developing countermeasures against them like, Brute Force Method implemented on the basis of limiting the number of attempts, Brute Force Method implemented on the basis of imposing a time limit, RSA, 3DES, KDC | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Cryptographic | en_US |
dc.subject | Cryptanalysis | en_US |
dc.subject | Cryptographic tools | en_US |
dc.title | Development of Cryptographic Tools and Their Cryptanalysis | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Development of Cryptographic Tools and Their Cryptanalysis.pdf | 1.43 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.