期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
印刷版ISSN:2277-6451
电子版ISSN:2277-128X
出版年度:2013
卷号:3
期号:11
出版社:S.S. Mishra
摘要:The need to secure computer systems is well understood and securing data must be part of an overall computer security plan. Growing amounts of sensitive information are being retained in files and more of these files are being made accessible via the Internet. As more information is made available electronically/digitally, it can be assumed that vulnerabilities and threats to the integrity of that information will increase as well. Info rmation security is becoming an increasingly important area and need to develop core understandings in this area. The primary objectives of information security are to prevent unauthorized access to information, prevent unauthorized tampering or modification of information, and to insure that information remains available when need ed. The concepts related to information security are multifaceted. People need to use the cryptographic operations in order to keep the personal sensitive information files to avert from foreigners in consideration of the security. The algorithm include bunch of to protect the attacks of foreigners to reach and read personal files that is located in personal computer or the owner would like to send somewhere or other location. Cryptographic consist of encryption and decryption techniques in computer and computer networking. In effort to keep information's in safety such as banking account information's or to provide file transaction without any problem such as password sharing caused such a security methods. This report describes what features are in the scope of the research and what are not in the scope of the research to be developed. Basically proposed work is dual security approach over confidential information. In this text information encrypted through encryptio n process then this encrypted information hide behind a word file. At other end extract encrypted information from encrypted cover file and then decrypted these information through decryption process to get original information