Journal of Mobile Communication

Year: 2007
Volume: 1
Issue: 4
Page No. 109 - 113

Security (GCSEC) Algorithm for non Real Time Data in Mobile Networks

Authors : M. Ganaga Durga , G. Chandrasekaran and S. Arivazhagan

Abstract: The focal hub delves into conniving an proficient 256-bit hash utility to shield the non real time data and its hacking echelon is compared with the hash algorithms. This study investigates the recital of hashing algorithms by an untried loom. Hash functions have ample and imperative role in cryptography. They generate hash ethics, which succinctly embody longer messages or credentials from which they were computed. The focal task of cryptographic hash functions is in the stipulation of message veracity checks and digital signatures. This algorithm utterly secures the non real time data by encrypting the data what is sent or time-honored.

How to cite this article:

M. Ganaga Durga , G. Chandrasekaran and S. Arivazhagan , 2007. Security (GCSEC) Algorithm for non Real Time Data in Mobile Networks . Journal of Mobile Communication, 1: 109-113.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved