
In today's word the authentication is very much required for the purpose of the transfer of the information from one place to another. Now a day's the use of E-mail become very popular because of their fast and easy to use in nature. This new technology has led to the problem of Authentication of the Message. To perform this activity we use the technique called MAC (Message Authentication Code). The message authentication code is the digest that is send along with the message to authenticate the origin of the message from where it is generated. The MAC (Message Authentication Code) is generated by the process of creating the message digest and also adding the encryption to it. However this is not very secure. In this paper we will encrypt the message digest and then again use the previously available cryptographic algorithm and again encrypt the Message. We this the idea of confusion and diffusion make are message more secure.
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 6 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
