Loading

Secure Text Transfer using Diffie-Hellman Key Exchange Based on Cloud
D Komali, Vamsi1, Tejsai2, Ganga Bhavani3
1D.Komali*, Koneru Lakshmaiah Education Foundation, Guntur, India.
2A.Vamsi, Koneru Lakshmaiah Education Foundation, Guntur, India.
3R.Ganga Bhavani, Koneru Lakshmaiah Education Foundation, Guntur, India.
4Ch.Tejsai, Koneru Lakshmaiah Education Foundation ,Guntur ,India. 

Manuscript received on November 19, 2019. | Revised Manuscript received on November 29 2019. | Manuscript published on 30 November, 2019. | PP: 9600-9605 | Volume-8 Issue-4, November 2019. | Retrieval Number: D9978118419/2019©BEIESP | DOI: 10.35940/ijrte.D9978.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Web based life are one of the slanting medias through which the clients speak with one another utilizing messages. Messages are sent from the source to the goal without breaking a sweat. Yet, what is the assurance that the message isn’t meddled by the gate crasher in the middle of the source and the goal? To fathom this issue, the protected content exchange utilizing Diffie Hellman Key Exchange dependent on cloud application is presented. Encryption is one of the procedures for giving security to the information that has been sent by the sender. There will be various calculations utilized so as to accomplish the encryption of the information. This application will enable the client to send the plain content to the goal. Prior to sending the message, the client needs to choose the calculation like AES, DES and so on. At that point the message will be scrambled utilizing such calculations. The key will be sent to the goal so as to decode the message. This will be one of the intriguing applications that one can chip away at and execute continuously world without hardly lifting a finger. Individuals can depend on this application without any difficulty utilizing this application. The UI will be straightforward and straightforward even by the basic man. The data that is private may be taken through such assaults.
Keywords: Crypto Graphical key, Communication Parties, Diffie–Hellman, MiM attack; Plain – text attack.
Scope of the Article: Waveform Optimization for Wireless Power Transfer.