Ira Nath, Pranati Rakshit, Renesha Ghosh, Sourav Ghosh, Dharmpal Singh
{"title":"NEHSC:一种新的高效的对称密钥加密启发式算法","authors":"Ira Nath, Pranati Rakshit, Renesha Ghosh, Sourav Ghosh, Dharmpal Singh","doi":"10.2139/ssrn.3511637","DOIUrl":null,"url":null,"abstract":"Cryptography involves encryption and decryption. The common utilized methods to secrete the significance of information comprise of the learning of cryptography. Cryptography is the method to revise of various methods for maintaining security issues for transmission of data in the existence of combatants. Usually, cryptography is regarding developing and analysis rules that can stop combatants or the peoples from studying confidential information; different directions of message safety such as information privacy, validation and non-repudiation are essential part of current cryptography techniques.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"NEHSC: A New Efficient Heuristic for Symmetric Key Cryptography\",\"authors\":\"Ira Nath, Pranati Rakshit, Renesha Ghosh, Sourav Ghosh, Dharmpal Singh\",\"doi\":\"10.2139/ssrn.3511637\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptography involves encryption and decryption. The common utilized methods to secrete the significance of information comprise of the learning of cryptography. Cryptography is the method to revise of various methods for maintaining security issues for transmission of data in the existence of combatants. Usually, cryptography is regarding developing and analysis rules that can stop combatants or the peoples from studying confidential information; different directions of message safety such as information privacy, validation and non-repudiation are essential part of current cryptography techniques.\",\"PeriodicalId\":361748,\"journal\":{\"name\":\"Communication & Technology eJournal\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Communication & Technology eJournal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.3511637\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Communication & Technology eJournal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3511637","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
NEHSC: A New Efficient Heuristic for Symmetric Key Cryptography
Cryptography involves encryption and decryption. The common utilized methods to secrete the significance of information comprise of the learning of cryptography. Cryptography is the method to revise of various methods for maintaining security issues for transmission of data in the existence of combatants. Usually, cryptography is regarding developing and analysis rules that can stop combatants or the peoples from studying confidential information; different directions of message safety such as information privacy, validation and non-repudiation are essential part of current cryptography techniques.