Download Now Free registration required
On considering the current scenario, Most of the existing systems which offer security to a network or web or to a data are vulnerable to attacks and they are breached at some point of time by effective cryptanalysis, irrespective of its complex algorithmic design. In general, today's crypto world is restricted to a practice of following any one single encryption scheme and that too for a single iteration on a single file basis. This is evident in the 99% of the encryption-decryption cases. So, a need for "Practically strong and infeasible to get attacked" technique becomes vital.
- Format: PDF
- Size: 287.27 KB