Summary: | The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used. Even multiple passwords are not preferred due to low entropies. The biometric is a very costly technique; moreover they may produce harmful effects to the body. Cryptography is used to avoid unauthorized access of data. It includes quite simple encryption algorithm and keys generated from the data. This paper deals with the parameters such as number of users, failure rate of various keys, recovery mechanism, encryption, transmission, decryption and latency time, etc; required for secure transmission of data. The proposed algorithm shows that all the stages are mutually independent from each other. It also provides the facility to use compression and re-encryption techniques.
|