Designing of a Symmetric Key Algorithm

As increment of the use of information and network, the intruders (outsiders) who are not authenticated, they also trying to access the data and if they got success in that situation they can do anything with the information. This information can be very important for the organization to which it is belong, and intruder can misused of these information. Also, for any successful communication, both the parties should understand each other language. If not then purpose of communication will not be established. Any communication medium that the human use in the form of plain text so other party can understand that what the opponent party wants to say.

Provided by: International Journal of Application or Innovation in Engineering & Management (IJAIEM) Topic: Mobility Date Added: Oct 2012 Format: PDF

Find By Topic