http://www.iaeme.com/IJCET/index.asp 36 editor@iaeme.com
International Journal of Computer Engineering & Technology (IJCET)
Volume 7, Issue 2, March-April 2016, pp. 36–43, Article ID: IJCET_07_02_005
Available online at
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=2
Journal Impact Factor (2016): 9.3590 (Calculated by GISI) www.jifactor.com
ISSN Print: 0976-6367 and ISSN Online: 0976–6375
© IAEME Publication
ARTIFICIAL NEURAL CRYPTOGRAPHY
DATAGRAM HIDING TECHNIQUES FOR
COMPUTER SECURITY OBJECTS
REGISTER
Dr. R. Mala
Assistant Professor, Department of Computer Science,
Alagappa University, Karaikudi, Tamilnadu
K. Karthikeyan
Research Scholar, Department of Computer Science
Marudupandiyar College, Vallam, Thanjavur, Tamilnadu
ABSTRACT
Cryptography is the scientific study of mathematical and algorithmic
techniques relating to information security. Cryptographic techniques will
help to protect information in cases where an attacker can have physical
access to the bits representing the information, ex. When the information has
to be sent over a communication channel that can be eaves dropped on by an
attacker. Cryptographic primitives are the basic building blocks for
constructing cryptographic solutions to information protection problems. A
cryptographic primitive consists of one or more algorithms that achieve a
number of protection goals. There is no well-agreed upon complete list of
cryptographic primitives, nor are all cryptographic primitives independent, it
is often possible to realize one primitive using a combination of other
primitives.
Key words: Cryptography, Datagram Protocol, Cipher, Decipher, AES,
CSOR
Cite this Article: Dr. R. Mala and K. Karthikeyan. Artificial Neural
Cryptography Datagram Hiding Techniques For Computer Security Objects
Register, International Journal of Computer Engineering and Technology,
7(2), 2016, pp. 36–43.
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=1