Implementation of Tangent and Cotangent rules to Provide Security in E-communication

نویسندگان

  • Narander Kumar
  • Vishal Verma
  • Vipin Saxena
  • Himanshu Gupta
  • Vinod Kumar Sharma
  • Anjali Patil
  • Rajeshwari Goudar
  • Mamta Sood
  • Manohar Wagh
  • Monika Cheema
  • Mahendra Kumar Patil
  • Suresh Babu
چکیده

In the data communication, the intriguing issue to provide data security and these led to comprise the many areas including the impregnable medium and trusted third party to maintain a database and various types of encryption techniques. These are main inducement of researchers in this area to protect the data from unauthorized users for malicious purpose. Therefore there are requires the different types of encryption and decryption techniques to secure the data. In the proposed paper, there are used the Tangent and Cotangent rules to generate the cipher and decipher at sending and receiving ends respectively. At the sending side, take the message alphabets which message want to communicate through electronic communication and find the corresponding values of alphabets from standard alphabetical table and apply the rules of Tangent. Find the corresponding values of Tangent of a particular alphabet and use this value as cipher at sending end. At the receiving end, there are taking the value of Cotangent of those particular receiving alphabets. Finally, get the value of same alphabets. This paper provides an algorithm as well as validates the proposed mechanism through UML Diagram.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Derived Algebraic Geometry IV: Deformation Theory

1 The Cotangent Complex: General Theory 4 1.1 Stable Envelopes and Tangent Bundles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.2 Relative Adjunctions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.3 The Tangent Correspondence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 1.4 The Relative Cotangent Complex...

متن کامل

شناسایی موانع پیاده سازی دولت الکترونیک در دستگاه های دولتی استان قم

This paper tries to identify obstacles of implementation of e-government in Ghom Province. With consideration to the review of the related literature and based on the obstacles of implementation of e-government, a questionnaire was designed with 65 questions handed out among in the statistical population of the research, composed of managers, employees and experts familiar with e-government in ...

متن کامل

سلامت الکترونیکی؛ از حصارهای بازدارنده تا فرایند قانونگذاری

E-health is to exchange information universally from one place to another through Internet and developed communication technology to provide health care. This is performed immediately after health care without missing useful information and its fast transformation. Valid license of provider E- health, using international standards in E- health, patients’ rights, high costs of E- health eq...

متن کامل

Implementation of Hyperbolic Tangent Function to Estimate Size Distribution of Rock Fragmentation by Blasting in Open Pit Mines

Rock fragmentation is one of the desired results of rock blasting. So, controlling and predicting it, has direct effects on operational costs of mining. There are different ways that could be used to predict the size distribution of fragmented rocks. Mathematical relations have been widely used in these predictions. From among three proposed mathematical relations, one was selected in this stud...

متن کامل

State`s Responsibility for Protecting the IPRs and the Food Security of Citizens

The protection of IPRs in agriculture and its related areas affects food security directly and indirectly. Right to Food and IPRs has both recognized in human rights instruments and states have the duty to protect and provide these rights. However the approaches about the relationship between IPRs and food security have been inconsistent so far. This inconsistency about the interaction between ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013