files/journal/2022-09-02_14-42-29-000000_438.png

Journal of Mobile Communication

ISSN: Online 1993-6044
ISSN: Print 1990-794x
112
Views
0
Downloads

Security (GCSEC) Algorithm for non Real Time Data in Mobile Networks

M. Ganaga Durga , G. Chandrasekaran and S. Arivazhagan
Page: 109-113 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

The focal hub delves into conniving an proficient 256-bit hash utility to shield the non real time data and its hacking echelon is compared with the hash algorithms. This study investigates the recital of hashing algorithms by an untried loom. Hash functions have ample and imperative role in cryptography. They generate hash ethics, which succinctly embody longer messages or credentials from which they were computed. The focal task of cryptographic hash functions is in the stipulation of message veracity checks and digital signatures. This algorithm utterly secures the non real time data by encrypting the data what is sent or time-honored.


How to cite this article:

M. Ganaga Durga , G. Chandrasekaran and S. Arivazhagan . Security (GCSEC) Algorithm for non Real Time Data in Mobile Networks.
DOI: https://doi.org/10.36478/jmcomm.2007.109.113
URL: https://www.makhillpublications.co/view-article/1990-794x/jmcomm.2007.109.113