A Generic Evolution of Key Using Quantum Cryptography Management for Transcript

Authors

  • Dhakad B Department of Information Technology, Student, ITM College, Bhilwara, Rajasthan, India
  • Gwala D Department of Information Technology, Student, ITM College, Bhilwara, Rajasthan, India
  • Sharma M Department of Information Technology, Student, ITM College, Bhilwara, Rajasthan, India
  • Shrivastava V Department of Information Technology, Head of Department, ITM College, Bhilwara, Rajasthan, India

Keywords:

Cryptography (Transcript’s, Quantum), Encryption Keys, Padding Algorithm

Abstract

Network Security is play very important role in Network system, Because in networked systems, the major security risks occur while conducting business on the Net; The following are some of the security risks occur: unauthorized access, Eavesdropping, Password sniffing, spoofing-spoofing, Denial of Service, virus attack, System modification, Data modification, Repudiation, E-mail bombing. Not With data storage and processing snowballing into a necessity from being an efficient part of any business process or organization, the need for securing storage at various degrees of granularity is gaining considerable interest. The challenge in designing an encrypted file system stems from balancing performance, security perception, ease of usage and enterprise level deploy ability. Often, the most secure solutions may not even be the best solution either due to hit on performance or due to decreased usability. Further, narrowing the trust circle to exclude even hitherto trusted system administrators makes creating an encrypted file system a huge engineering exercise.

References

Mick Bauer. Paranoid penguin: Bestcrypt: crossplatform filesystem encryption. Linux J., 2002(98):9, 2002.

Matt Blaze. A cryptographic file system for UNIX. In ACM Conference on Computer and Communications Security, pages 9–16, 1993.

V Bhanu Chandra. PKI for transcrypt. Technical report, Indian Institute of Technology Kanpur, Kanpur, 2006.

V Bhanu Chandra. Transparent encrypted filesystem. Technical Report, Indian Institute of Technology Kanpur, Kanpur, 2006.

Abhijit Bagri. Key Management for Transcrypt Indian Institute of Technology Kanpur, Kanpur, 2007.

CryptoAPI. The GNU/Linux CryptoAPI, 2003. http://www.kernel.org.

Mohan Dhawan. libacl for transcrypt. http://www.security.iitk.ac.in/home/transcrypt.

dm crypt. A device-mapper crypto target for linux. http://www.saout.de/misc/dm- crypt/.

Satyam Sharma. Transcrypt: Design of a secure and transparent encrypting file system.M. Tech Thesis, Indian Institute of Technology Kanpur, Kanpur, 2006.

Dr. David Knight, Dr. Paul Roach. University of Glamorgan 2004

Downloads

Published

2024-02-26

How to Cite

Dhakad, B., Gwala, D., Sharma, M., & Shrivastava, V. (2024). A Generic Evolution of Key Using Quantum Cryptography Management for Transcript. COMPUSOFT: An International Journal of Advanced Computer Technology, 2(03), 54–58. Retrieved from https://ijact.in/index.php/j/article/view/12

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.