A Generic Evolution of Key Using Quantum Cryptography Management for Transcript
Keywords:
Cryptography (Transcript’s, Quantum), Encryption Keys, Padding AlgorithmAbstract
Network Security is play very important role in Network system, Because in networked systems, the major security risks occur while conducting business on the Net; The following are some of the security risks occur: unauthorized access, Eavesdropping, Password sniffing, spoofing-spoofing, Denial of Service, virus attack, System modification, Data modification, Repudiation, E-mail bombing. Not With data storage and processing snowballing into a necessity from being an efficient part of any business process or organization, the need for securing storage at various degrees of granularity is gaining considerable interest. The challenge in designing an encrypted file system stems from balancing performance, security perception, ease of usage and enterprise level deploy ability. Often, the most secure solutions may not even be the best solution either due to hit on performance or due to decreased usability. Further, narrowing the trust circle to exclude even hitherto trusted system administrators makes creating an encrypted file system a huge engineering exercise.
References
Mick Bauer. Paranoid penguin: Bestcrypt: crossplatform filesystem encryption. Linux J., 2002(98):9, 2002.
Matt Blaze. A cryptographic file system for UNIX. In ACM Conference on Computer and Communications Security, pages 9–16, 1993.
V Bhanu Chandra. PKI for transcrypt. Technical report, Indian Institute of Technology Kanpur, Kanpur, 2006.
V Bhanu Chandra. Transparent encrypted filesystem. Technical Report, Indian Institute of Technology Kanpur, Kanpur, 2006.
Abhijit Bagri. Key Management for Transcrypt Indian Institute of Technology Kanpur, Kanpur, 2007.
CryptoAPI. The GNU/Linux CryptoAPI, 2003. http://www.kernel.org.
Mohan Dhawan. libacl for transcrypt. http://www.security.iitk.ac.in/home/transcrypt.
dm crypt. A device-mapper crypto target for linux. http://www.saout.de/misc/dm- crypt/.
Satyam Sharma. Transcrypt: Design of a secure and transparent encrypting file system.M. Tech Thesis, Indian Institute of Technology Kanpur, Kanpur, 2006.
Dr. David Knight, Dr. Paul Roach. University of Glamorgan 2004
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2013 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.