http://www.iaeme.com/IJCET/index.asp 36 editor@iaeme.com International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 2, March-April 2016, pp. 3643, Article ID: IJCET_07_02_005 Available online at http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=2 Journal Impact Factor (2016): 9.3590 (Calculated by GISI) www.jifactor.com ISSN Print: 0976-6367 and ISSN Online: 09766375 © IAEME Publication ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURITY OBJECTS REGISTER Dr. R. Mala Assistant Professor, Department of Computer Science, Alagappa University, Karaikudi, Tamilnadu K. Karthikeyan Research Scholar, Department of Computer Science Marudupandiyar College, Vallam, Thanjavur, Tamilnadu ABSTRACT Cryptography is the scientific study of mathematical and algorithmic techniques relating to information security. Cryptographic techniques will help to protect information in cases where an attacker can have physical access to the bits representing the information, ex. When the information has to be sent over a communication channel that can be eaves dropped on by an attacker. Cryptographic primitives are the basic building blocks for constructing cryptographic solutions to information protection problems. A cryptographic primitive consists of one or more algorithms that achieve a number of protection goals. There is no well-agreed upon complete list of cryptographic primitives, nor are all cryptographic primitives independent, it is often possible to realize one primitive using a combination of other primitives. Key words: Cryptography, Datagram Protocol, Cipher, Decipher, AES, CSOR Cite this Article: Dr. R. Mala and K. Karthikeyan. Artificial Neural Cryptography Datagram Hiding Techniques For Computer Security Objects Register, International Journal of Computer Engineering and Technology, 7(2), 2016, pp. 3643. http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=1