In the present digital era, secure communication has become a critical requirement in networking, particularly in wireless communication systems. Security is a primary concern for organizations and developers alike, especially for protecting sensitive documents and transmitted data (Rahul Aggarwal et al., 2011; Nur Atiqah Muhammad et al., 2011). Cryptographic techniques are widely employed in social networks and open environments to ensure data confidentiality and integrity. However, despite these measures, attackers are often able to breach firewalls and intercept sensitive information (Muhammad Mubashir Khan et al., 2010). In Mobile Ad hoc Networks (MANETs), cryptography has gained significant importance, particularly in application-oriented domains such as military operations, where legitimate users exchange confidential information. The presence of malicious nodes in such networks poses serious security threats, as attackers may hijack transmitted data (Anju Chahal et al., 2014). To address this, the original message is encrypted before transmission using pair-wise keys. Upon receiving the data, the destination node must identify the correct key to decrypt the message; failure to do so may result in the node being classified as malicious (Rahul Aggarwal et al., 2011; Mohamed Elboukhari et al., 2010). Encryption techniques are extensively used in broadcasting, communication infrastructures, and digital services such as web applications, e-mail, and mobile communications (Mohamed Elboukhari et al., 2010).
Bitte wählen Sie Ihr Anliegen aus.
Rechnungen
Retourenschein anfordern
Bestellstatus
Storno







