Abstract

Cyber and Information Security are one of the most concernable and challenging issues of today’s strengthen Information age. Cyber attackers and Cyber intruders performs and accomplished a very highly powerful and potential Cyber threat in our most sensitive Cyber Space and threaten our Cyber Security. So the need of the hour is that we have some robust and vigorous Cyber Security algorithms which protects our Cyber Space against these cyber Intruders or Cyber Criminals. Because many algorithms, which are currently runs to protect Cyber Space and responsible for potential data encryption and decryption mechanisms during sensitive transactions of data are worked very slow in manner and consume a large size of memory bandwidth and contains a very expensive computational cost and as the technological advancements in our Cyber Space, Cyber Intruder and Cyber Criminal achieved a very high skills mechanisms to breach the securities bridge of that algorithms, and some algorithms which contains a very typical and complex structure taking a lot of time to perform the mechanisms of desired security tasks and very costly rich for computations. So we design two Cyber Security algorithms models, which also contains a very complex and typical structure but never consume a lot of computation power and as well as memory and also contains a least cost for performing computations, these both two algorithms are a fusion of multiple ciphers and some control mechanisms, which are technically very strong as well as redirect to optimality. Randomization are the main theme point of first algorithm that’s why for Cyber Intruders and Cyber Criminals are very hard to find the actual pattern of data or to accomplished any Cyber Attacks. The detailed mechanisms of these algorithms are covers in the next upcoming sections of this research paper.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.