4 resultados para 320.84

em Cochin University of Science


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis entitled “Development planning at the state level in india a case study with reference to kerala1957-84.Planning in India is a concurrent subject with the Centre and the States having well-defined domains of jurisdiction with regard to planning functions and sources of resource mobilisation.The genesis of the lack of academic interest in state level planning is in the widely held belief that in the extent scheme of Centre-State economic relations, the states have little scope for initiative in planning.Both at the theoretical and empirical levels, Kerala has attached very great importance to planning.It has been the localeof wide and deep discussions on the various dimensions of planning.In Kerala's development process, the leading sector consists of social services such as education and public healthOne point that needs special emphasis in this regard is that the high demand for education in Kerala cannot be attributed to the Keralites' ‘unique urge‘ for education. Rather, it is related to the very high level of unemployment in the state (Kerala has the highest level of unemployment in the country.In resource allocation under the Five Year Plans, Kerala attached the highest weightage to power generation, hydro-electric projects being the major source of power in the state. Nearly one-fourth of the plan resources has been claimed by hydro-electric projects.In the agricultural sector, Kera1a's level of productive use of electric power is one of the lowest.As is evident.from above, planning in Kerala has not enabled us to solve the basic problems of the state. More 'scientific' planning in the sense of applying mre sophisticated planning techniques is obviously not the answer. It, on the contrary, consists of more fundamental changes some of which can be brought about through an effective use of measures well within the power of the State Government.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes JERIM-320, a new 320-bit hash function used for ensuring message integrity and details a comparison with popular hash functions of similar design. JERIM-320 and FORK -256 operate on four parallel lines of message processing while RIPEMD-320 operates on two parallel lines. Popular hash functions like MD5 and SHA-1 use serial successive iteration for designing compression functions and hence are less secure. The parallel branches help JERIM-320 to achieve higher level of security using multiple iterations and processing on the message blocks. The focus of this work is to prove the ability of JERIM 320 in ensuring the integrity of messages to a higher degree to suit the fast growing internet applications