Full Paper View Go Back

Randomly Generated Algorithms and Dynamic Connections

Harmanpreet Singh1 , Amritpal Singh Danewalia2 , Deepak Chopra3 , aveen Kumar N4

Section:Technical Paper, Product Type: Journal
Vol.2 , Issue.1 , pp.1-4, Jan-2014

Online published on Feb 28, 2014


Copyright © Harmanpreet Singh, Amritpal Singh Danewalia, Deepak Chopra , Naveen Kumar N . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Harmanpreet Singh, Amritpal Singh Danewalia, Deepak Chopra , Naveen Kumar N, “Randomly Generated Algorithms and Dynamic Connections,” International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.1, pp.1-4, 2014.

MLA Style Citation: Harmanpreet Singh, Amritpal Singh Danewalia, Deepak Chopra , Naveen Kumar N "Randomly Generated Algorithms and Dynamic Connections." International Journal of Scientific Research in Network Security and Communication 2.1 (2014): 1-4.

APA Style Citation: Harmanpreet Singh, Amritpal Singh Danewalia, Deepak Chopra , Naveen Kumar N, (2014). Randomly Generated Algorithms and Dynamic Connections. International Journal of Scientific Research in Network Security and Communication, 2(1), 1-4.

BibTex Style Citation:
@article{Singh_2014,
author = {Harmanpreet Singh, Amritpal Singh Danewalia, Deepak Chopra , Naveen Kumar N},
title = {Randomly Generated Algorithms and Dynamic Connections},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {1 2014},
volume = {2},
Issue = {1},
month = {1},
year = {2014},
issn = {2347-2693},
pages = {1-4},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=130},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=130
TI - Randomly Generated Algorithms and Dynamic Connections
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Harmanpreet Singh, Amritpal Singh Danewalia, Deepak Chopra , Naveen Kumar N
PY - 2014
DA - 2014/02/28
PB - IJCSE, Indore, INDIA
SP - 1-4
IS - 1
VL - 2
SN - 2347-2693
ER -

3645 Views    3511 Downloads    3364 Downloads
  
  

Abstract :
In the modern computer world, maintaining the information is very difficult. Some interrupts may occur on the local system (attack) or network based systems (network attack). Without security measures and controls in place, our data might be subjected to an attack. Several passive attacks like wire-tapping, port scanning etc. are well known that are used to monitor communication between nodes and also further used in other types of active attacks like man-in-the-middle attack etc. The man-in-the-middle attack, in cryptography and computer security is a form of active eavesdropping in which independent connections are made by the attacker with the victims so that attacker can relay messages between them. The entire conversation is controlled by the attacker making the victims believe that they are communicating with each other privately. Our approach to stop these types of attack is described as, once the initial authentication is done between the communicating nodes, they can start communicating using some standard encryption algorithm like DES, TEA or public key cryptography. But instead of using the same static communication channel and encryption algorithm, we will switch between different algorithms after a certain interval of time which has already been available with nodes.

Key-Words / Index Term :
Communication System Security, Computer Network Security, Data Security, Internetworking, Network

References :
[1]. Derek Williams, “The Tiny Encryption Algorithm (TEA), CPSC 6128 – Network Security”, Columbus State University, 2008.
[2]. Prof K.Govinda, Dr.E.Sathiyamoorth, “Multilevel cryptography technique using graceful codes”, Journal of Global Research in Computer Science, 2011.
[3]. Matt Blumenthal,Encryption: “Strengths and Weaknesses of Public-key Cryptography”, Department of Computing Sciences, Villanova University, Villanova, PA 19085 CSC 3990 – Computing Research Topics
[4]. Niraj Kumar, Prof. Sanjay Agrawal, “Issues and Challenges in Symmetric Key based Cryptographic Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, 2013.
[5]. C. Onwubiko, A. P. Lenaghan, “Managing Security Threats and Vulnerabilities for small to Medium Enterprises”, IEEE International Conference on Intelligence and Security Informatics 2007.
[6]. H Sathu, Network Security: “A Layered Ap-proach”, NZ Journal of Applied Computing & Information, 2002.
[7]. Yunhong GU, Robert L. Grossman, “UDP-based data transfer for high-speed wide area networks”, Science Direct, 2007.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation