3 research outputs found

    Survey on Various Cryptography Methods

    No full text
    Abstract: To make secure data transmission over networks cryptography is used. The algorithm selected for cryptography should fulfil the conditions of integrity protection, conventional message authentication and digital signatures. Key exchange algorithms, hash functions, PN numbers are used for encryption and decryption of data. This encryption can be applied on data in stream format or in blocks. Moreover the length of key is the biggest constraint in encryption. Here in our paper we have studied present algorithms currently used for encryption

    Review of various e-Learning Methodologies

    No full text
    Abstract — E-learning is among the most important explosion propelled by the internet alteration. This allows users to successfully gather knowledge and education both by synchronous and asynchronous methodologies to effectively face the need to rapidly acquire up to date know-how within productive environments. This review paper focuses various on e-learning methodologies The different categories of e-learning that includes informal and combination learning, network and based on worked learning. The most important focus of e-learning methodologies is on both asynchronous and synchronous methodology

    Analysis of Secure Electronic Transmission (SET) System for Electronic Transactions

    No full text
    Abstract — In this paper, we introduce about protection of electronic payment for those whoever uses Internet transaction. This system is use to secure Internet transaction for three types of participants, 1) Payment gateway server, 2) Merchant server, and 3) Bank Server. SET has been developed by both Visa and MasterCard, as a way to secure our card transactions over internet, and industrial interest in the protocol is high. The security architecture of the system is designed by using Many Security Protocols and techniques, which eliminates the fraud that occurs today with stolen credit card/debit card payment information and customer information. Electronic commerce involves the exchange of some form of money for goods and services over the Internet but today, Internet is an insecure and unreliable media. Index Terms- SSL/TLS and SET Protocol, symmetric & asymmetric Methodology, Dual signatures, and Communication tunnel techniques, e-payment protocol. 1
    corecore