Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7961
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGandhi, Shivi-
dc.contributor.authorSrivastava, Aditya-
dc.contributor.authorLucktoo, Ashmita-
dc.contributor.authorGupta, Kanika-
dc.contributor.authorGhrera, Satya Prakash [Guided by]-
dc.date.accessioned2022-10-19T06:31:54Z-
dc.date.available2022-10-19T06:31:54Z-
dc.date.issued2013-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7961-
dc.description.abstractToday, security is one of the foremost concerns in the transmission of data over the internet or over any other network. We will thus develop applications to implement various security services that will help the individuals in the network to maintain their safety and privacy. Also, the strength of these security solutions will be cryptanalyzed through study of various networking attacks and developing countermeasures against them like,  Brute Force Method implemented on the basis of limiting the number of attempts,  Brute Force Method implemented on the basis of imposing a time limit,  RSA, 3DES, KDCen_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectCryptographicen_US
dc.subjectCryptanalysisen_US
dc.subjectCryptographic toolsen_US
dc.titleDevelopment of Cryptographic Tools and Their Cryptanalysisen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Development of Cryptographic Tools and Their Cryptanalysis.pdf1.43 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.