Public Network Security by Bluffing the Intruders Through Encryption Over Encryption Using Public Key Cryptography Method
Cryptography and network security is the concept of protecting the network and data transmission. Security of data is important, as data is transferred over unreliable network. Public-key cryptography provides optimal solutions to many of the existing security issues in communication systems. In our proposed algorithm we have used some of these secure algorithms in order to generate a highly secured algorithm which can deal with the various flaws of these algorithms. RSA, Reil-fence algorithm, substitution and transposition algorithms has been used in the proposed algorithm. Encryption over encryption is done in order to confuse the intruder. The proposed algorithm is used to provide multilevel security.
KeywordsRSA algorithm Reil-fence algorithm Public key cryptography Encryption over encryption
- 5.Prasanthi, V.K., Kumar, A.: Optimizing delay in sequential change detection on ad hoc wireless sensor networks. In: IEEE SECON, VA, USA, pp. 306–315, September 2006Google Scholar
- 11.Omari, M.: An efficient application of a dynamic crypto system in mobile wireless security. In: IEEE International Conference on Wireless Communications and Networking, pp. 837–842 (2004)Google Scholar