z-logo
open-access-imgOpen Access
Data cryptography based on musical notes on a fingerboard along with a dice
Author(s) -
Asis Kumar Tripathy,
Tapan Kumar Das,
C. Navaneethan
Publication year - 2019
Publication title -
indonesian journal of electrical engineering and computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.241
H-Index - 17
eISSN - 2502-4760
pISSN - 2502-4752
DOI - 10.11591/ijeecs.v14.i3.pp1286-1290
Subject(s) - encryption , cryptography , computer science , computer security , financial cryptography , key (lock) , cipher , the internet , public key cryptography , world wide web
The security of an online system is the foremost necessity nowadays. With huge growth of the IT power and with the invention of new technologies, the number of threats a user faces is growing exponentially. Cryptography is a combination of security engineering and mathematics. It is the best technology for securing distributed systems. Cryptography consists in processing plain information by applying a cipher and producing encoded output, unknown to a third-party who does has no idea about the key. In cryptography both encryption and decryption phase are processed by one or more keys. Encryption is extremely important for a safe and secure environment for the computers and the Internet.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here