Hybrid Security Approach for Database Security using Diffusion based cryptography and Diffie-Hellman key exchange Algorithm

Author(s):  
M. Somasundara Rao ◽  
K. Venkata Rao ◽  
M. H. M. Krishna Prasad
Author(s):  
Yibo Liu ◽  
Xuejing Hao ◽  
Yanjun Mao

At present, the mental health of college students has also become an important issue that urgently needs attention under the influence of the surrounding environment. It is coupled with the grim employment situation after graduation and the students’ psychological burden is becoming more and heavier. This paper based on Diffie-Hellman key exchange algorithm studied the effect of psychological stress intervention. First, the Diffie-Hellman key exchange algorithm was analyzed, and then the Diffie-Hellman prediction model was established according to the psychological pressure of college students. Secondly, the simulation test was conducted to compare the simulated results with the original data. The conclusion of the data fitting of the network model training set, verification set and test set were good and the error was very small. Finally, the detailed application of the algorithm and the model were described.


Author(s):  
Suresh Koduru ◽  
PVGD Prasad Reddy ◽  
Padala Preethi

<p>Today Internet of things (IoT) interconnects any object possessing sensing and computing capabilities to the internet. In this era, increasing number of electronic devices and applications in Internet of Things (IoT) requires secured communication with low power consumption capabilities. As security is a major challenge in internet of things, it is important to design a key management solution that considers resource constrained nodes and hence key management in public key cryptography is a crucial issue. In this paper, a novel key exchange algorithm was developed and implemented on a low powered “Raspberry pi machine” to realize the overall impact it creates on the device. The performance of the proposed algorithm had shown a great improvement over the popular Diffie Hellman key exchange algorithm and a two-level security for data exchange between the parties is implemented.</p>


Author(s):  
Vijay Kumar Yadav ◽  
Rakesh Kumar Yadav ◽  
Brijesh Kumar Chaurasia ◽  
Shekhar Verma ◽  
S. Venkatesan

Sign in / Sign up

Export Citation Format

Share Document