User Authentication Using Color and Secure Message Transmission Using Armstrong Number
Keywords:
Data Security, Confidentiality, Authentication, Integrity, Cryptography, Color Code, Armstrong Number, AES EncryptionAbstract
These days data security assumes a crucial job where confidentiality, authentication, and integrity are given real significance. Every single overall programmer is ending up progressively dynamic. Along these lines, it is quickly ending up increasingly essential to secure our data. There are various techniques used to make data transmission with insurance and Cryptography is one of them. The worldwide mechanism for serving the confidentiality of transmitted data is Cryptography. This undertaking gives an application to scramble the data subsequently joining Armstrong numbers and shading codes to produce mystery key as the secret word thus to decode the record which is encoded utilizing AES calculation.
References
- Prof: Riya Qureshi, Shikha singh, Diksha Itankar Review on “Security Using Colours and Armstrong Numbers.” International Journal of Innovative Research in Computer and Communication Engineering Vol. 4, Issue 3, March 2016.
- Ajisha John, 2Keerthy.K.B, Meenu Manoharan and Diana Davis “Data Security Through Armstrong Number and Colors.” International Journal of Computer Sciences and Engineering 2015.
- Message Security Using Armstrong Numbers and Authentication Using Colors-International Journal of Advanced Research in Computer Science and Software Engineering January 2014
- Data Security in Message Passing using Armstrong Number-International Journal of Computer Science Trends and Technology (IJCST)-Mar-Apr 2014
- Ajay Bansode, Amit Joshi, Awanish Singh, Kiran Gosavi, Prasad S.Halgaonkar, Vijay M.Wadhai ” Data Security in Message Passing using Armstrong Number.” International Journal of Computer Science Trends and Technology , Mar-Apr 2014.
- Data Security Using Armstrong Numbers-International Journal of Emerging Technology and Advanced Engineering April 2012
- Security Using Colors and Armstrong Numbers-NATIONAL CONFERENCE ON INNOVATIONS IN EMERGING TECHNOLOGY.
- S.Belose, M. Malekar, G.Dharmawat, “Data Security Using Armstrong Numbers”, International Journal of Emerging Technology and Advanced Engineering. (ISSN 2250-2459, Volume 2, Issue 4, April 2012).
- Atul Kahate, “Cryptography and Network Security “, Tata McGraw Hill Publications.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.