摘要:The history of Information Security begins with the study of computer security. Security concern arises from various parameters to safeguard physical location, hardware and software from the outside threats. The research work carries out essential security needs and adoptions of security policies based on Resilient Key Distribution Mechanisms (RKDM) to safeguard information transmissions over networks. The adoption of sender and receiver whom are called as ‘clients’ should register themselves initially. The registration work of them clients are maintained in separate databases maintained for them, and whenever each user makes a login request, thereby an individual private key is created by the clients themselves. To know their own authentication, a centralized server which is called as an ‘Authentication Server (AS) is maintained to monitor the data transaction of the clients and the application which runs between them. After confirming the registration ,the server issues resilient key (Public keys) for each of the user for their data transactions in the networks. The authentication server issues resilient key only after verification of each client who register themselves within it