High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Multiple Identity-Based Cryptography Algorithm (MICA)

Author(s):

Yash Patel , GTU P.G. School

Keywords:

Cryptography, Symmetric-key, Asymmetric-key, Identity-based, Security, Mobile, Sensor, Wireless, GSM, MICA

Abstract

Cryptography is the study of methods by which safe and secure communication happens where other parties are involved known as adversaries. More precisely, it involves the analysis of protocols to get rid of these so called adversaries which may cause a loop hole the aspects of information security (Non-repudiation, data confidentiality, authentication, data integrity). Real world applications of cryptography are inevitable and eternal. Some of the areas where cryptography plays a vital role are passwords, E-commerce, ATMs etc. Also the fields like Mathematics, Computer science, Electronics, Electrical Engineering uses the concepts of cryptography. There are many small scale devices present in the market i.e. mobile device which have limited resources such as less battery power, limited processing, less memory. There easily could be a security breach in to such light-weight systems, hence secure cryptographic algorithm should be developed to provide the security for data.

Other Details

Paper ID: IJSRDV3I40623
Published in: Volume : 3, Issue : 4
Publication Date: 01/07/2015
Page(s): 960-963

Article Preview

Download Article