z-logo
open-access-imgOpen Access
Data Security Using Armstrong Numbers
Author(s) -
S. Belose,
M. Malekar,
Swapnil Dhamal,
G. Dharmawat,
Niranjan Kulkarni
Publication year - 2012
Publication title -
irnet undergraduate academic research journal
Language(s) - English
Resource type - Journals
ISSN - 2278-1129
DOI - 10.47893/uarj.2012.1018
Subject(s) - computer science , communication source , encryption , computer security , cryptography , authentication (law) , confidentiality , key (lock) , data security , computer network
In the real world, it is difficult to transmit data from one place to another with security. To ensure secured data transmission, universal technique called cryptography is used, which provides confidentiality of the transmitted data. In this paper Encryption and decryption process uses Armstrong number which is referred as a secret key. To make the Authentication between two intended users along with the security, server is used. With the help of server, both sender and receiver will get validated. Then actual data could be transmitted by any of the means.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here