A SURVEY OF DIFFERENT METHODS OF HYBRID CRYPTOGRAPHY

!!!! Bi-Annual Double Blind Peer Reviewed Refereed Journal !!!!

!!!! Open Access Journal !!!!

Abstract: 

In recent trends the websites which we are connected as socially and we have friends like that we are share the information having certain content will attract much more visitors than others. This proposal enact privacy protection scheme which prevents identity of users and also hide some data from unknown users. In this field network security is recognized by network supervisor to avoid and observe illegal contact, change and rejection of computer network. We will propose a security for that and they not only prevent the exposure of identity  also the exposure of preferable landscapes in user’s personal data. The users can select their personal choice for the data what are the users can see them information. In this proposal we use a combination of two algorithms (MD5 and Gaussian technique). MD5 is use for check the integrity of users and Gaussian is for handle the users’ request. Gaussian is handle a number of request in one database. And in between time the MD5 check integrity the login user is valid or not.

Category: 
Vol9_Issue2
Authors: 
Pandya Priyanka, Research Scholars, GTU PG SCHOOL, Gandhinagar, India
Miss. Aaradhna Deshmukh, CDAC ACTS, Pune
Rating: 
No votes yet