Mobility

Designing of a Symmetric Key Algorithm

Date Added: Oct 2012
Format: PDF

As increment of the use of information and network, the intruders (outsiders) who are not authenticated, they also trying to access the data and if they got success in that situation they can do anything with the information. This information can be very important for the organization to which it is belong, and intruder can misused of these information. Also, for any successful communication, both the parties should understand each other language. If not then purpose of communication will not be established. Any communication medium that the human use in the form of plain text so other party can understand that what the opponent party wants to say.