Authentication Using Secure Node Signature Verification Algorithm with Quantum Cryptography

Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
In now a days, most of the communication takes place through internet. Most of the users are used to transmit their information through insecure channels that are interconnected throughout world. Thus, security must be provided to achieve confidentiality, access control, integrity and authentication. To ensure all these services, various cryptography and steganography techniques like RSA, AES, MD5 and RC5 have been used. Even though, cryptanalysts reinforcing it using some mathematical computation and misused information. Currently, quantum computers have been used to increase the speed of computation and to provide more security for data.

Find By Topic