It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

CRYPTOGRAPHY | Kumar | INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY

CRYPTOGRAPHY

Dr. Vinod Kumar, Er.Gagandeep Raheja, Ms Subeena Sareen

Abstract


To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting information by transforming it into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable. Database security policies are guidelines for present and future decisions regarding the maintenance of the database security. Database security mechanisms are the functions used to enforce the database security policies.  There are number of security policies that can be applied on data in order to protect the data against unauthorized access. Protecting the data is the prime need of an organization.


Keywords


Ciphertext; encryption; decryption; plain text.

Full Text:

PDF

References


http://www.webopedia.com/TERM/C/cryptography.html

http://www.google.co.in/imgres?imgurl=http://upload.wikimedia.org/wikipedia/commons/thumb/f/f8/Crypto.png/300px-Crypto.png&imgrefurl=http://en.wikipedia.org/wiki/Cryptography&h=201&w=300&sz=38&tbnid=mbjtkrg-mmtXfM:&tbnh=82&tbnw=123&zoom=1&usg=__SQm9-A6cWtR1JwtsYRJd9LVAi9s=&docid=ghih9TsPuuKjAM&hl=en&sa=X&ei=OOXuUPu8HYbekgXDwYHIAQ&sqi=2&ved=0CEMQ9QEwAw&dur=3900

ABS PUBLICATIONS BY DR VINOD KAMBOJ


Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

@ 2010 onward COUNCIL FOR INNOVATIVE RESEARCH

All rights reserved with Journal Manager CIR.

To make sure that you can receive messages from us, please add our domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.

For any Technical Support editor@cirworld.com, editorcir@gmail.com