42
Views
7
CrossRef citations to date
0
Altmetric
Articles

Competing secure text encryption in intranet using elliptic curve cryptography

&
 

Abstract

Privacy and Security is one of the major requirements of every network. Intranet based applications are used to avoid third party data sharing or prevent sensitive communication from spying or sniffing from Internet service providers. Intranet applications are used to provide safe and secure communication within network and overcome dependency from ISP. It is used by sensitive departments like military, Navy, ISRO and many more. This work attempts to provide secure communication architecture to achieve 'confidentiality and data integrity in more strong way. Secure communication among pear-to-pear devices is important as it accesses remotely in a convenient, controlled and efficient way. For validation and authentication, the cryptographic technique is used. Intranet application connects multiple systems through the network, every organization have their own intranet network. The proposed system implements a secure system using Elliptic curve cryptography for cryptographic algorithm and integrate checksum estimation method. Data is divided into chunks for processing and key is generated for further process. Java technology is used to validate the performance of the proposed model in the context of key generation, encryption, decryption, and checksum calculation.

Subject Classification:

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.