KUNAL ASTROCRYPTOGRAHY SECURITY USING DISTANCE FORMULA AND 3D GEOMETRY
Main Article Content
Keywords
Distance Formula, 3D Geometry, data security, authentication, cryptography, ASCII.
Abstract
In real world, data security plays an important role where confidentiality, authentication, integrity, non repudiation are given importance. The universal technique for providing confidentiality of transmitted data is cryptography. This paper provides a technique to encrypt the data using distance formula and 3D geometry.
Downloads
Download data is not yet available.
References
1. S. Pavithra Deepa, S. Kannimuthu, V. Keerthika ,“Security Using Colors and Armstrong
Numbers”, Proceedings of the National Conference on Innovations in Emerging Technology-
2011 Kongu Engineering College, Perundurai, Erode, Tamilnadu, India.17 & 18 February,
2011.pp.157-160
2. An article on Distance http://en.wikipedia.org/wiki/Distance
3. An Article on Sphere http://en.wikipedia.org/wiki/Sphere
4. An article on ASCII codes http://en.wikipedia.org/wiki/ASCII
5. Dr.M.Mohamed Sathik, A. Kalai Selvi, ” Secret sharing scheme for data encryption based on
polynomial coefficient”, 2010 Second International conference on Computing, Communication
and Networking Technologies
6. Mohammad Zakir Hossain Sarker, Md. Shafiul Parvez , “A Cost Effective Symmetric Key
Cryptographic Algorithm for Small Amount of data”
7. Ahmed Desoky, “Cryptography: Algorithms and Standards”, 2005 IEEE International
Symposium on Signal Processing and Information Technolog
Numbers”, Proceedings of the National Conference on Innovations in Emerging Technology-
2011 Kongu Engineering College, Perundurai, Erode, Tamilnadu, India.17 & 18 February,
2011.pp.157-160
2. An article on Distance http://en.wikipedia.org/wiki/Distance
3. An Article on Sphere http://en.wikipedia.org/wiki/Sphere
4. An article on ASCII codes http://en.wikipedia.org/wiki/ASCII
5. Dr.M.Mohamed Sathik, A. Kalai Selvi, ” Secret sharing scheme for data encryption based on
polynomial coefficient”, 2010 Second International conference on Computing, Communication
and Networking Technologies
6. Mohammad Zakir Hossain Sarker, Md. Shafiul Parvez , “A Cost Effective Symmetric Key
Cryptographic Algorithm for Small Amount of data”
7. Ahmed Desoky, “Cryptography: Algorithms and Standards”, 2005 IEEE International
Symposium on Signal Processing and Information Technolog
