Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/1764
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Adebayo, Olawale Surajudeen | - |
dc.contributor.author | Olalere, Morufu | - |
dc.contributor.author | Mishra, Amit | - |
dc.contributor.author | Ugwu, Joel N. | - |
dc.contributor.author | Mabayoje, Modina A. | - |
dc.date.accessioned | 2021-06-06T17:02:11Z | - |
dc.date.available | 2021-06-06T17:02:11Z | - |
dc.date.issued | 2014 | - |
dc.identifier.issn | 147-155 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/1764 | - |
dc.description.abstract | Security of information cannot be perfectly realized as both it and its counter technology continue to evolve. In the same vein, using a single cryptographic cipher to realize information secrecy is not enough as it can be broken over time, thus revealing the information in plaintext. Most of the existing cryptographic ciphers possess a minimal level of weakness, which is exploitable over time, but when this algorithmic transformation is used in multiple times, the number of trials, effort, and time required to exploit it become greater. This paper proposes a multilevel algorithm for realizing the security of information using a multiple-cryptographic ciphers process. It presents the possibility of combining n- cryptographic ciphers in a single implementation within the system, permitting n-cryptographic transformation to take place during the encryption and decryption processes | en_US |
dc.language.iso | en | en_US |
dc.publisher | Transactions on Networks and Communications | en_US |
dc.relation.ispartofseries | Volume 2;5 | - |
dc.subject | Cryptography | en_US |
dc.subject | Encryption, , , , | en_US |
dc.subject | n-cryptographic algorithms | en_US |
dc.subject | Cryptanalysis | en_US |
dc.subject | Multilevel Algorithm | en_US |
dc.title | N-Cryptographic Multilevel Algorithm for Effective Information Security | en_US |
dc.type | Article | en_US |
Appears in Collections: | Cyber Security Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
TCN 504-1550-1-PB.pdf | 746.93 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.