Loading

A Procedure to Prevent Confidential Information Leakage of Government Organizations in Bangladesh using Isakmp Cryptographic Technique
Tasniya Ahmed1, Marjia Sultana2, Md. Rakib Hasan3, Mahmuda Khatun4, Israt Jahan5

1Tasniya Ahmed*, Institute of Information Technology, Noakhali Science & Technology University, Nokhali, Bangladesh.
2Marjia Sultana, Department of Computer Science & Engineering ,Begum Rokeya University, Rangpur, Bangladesh.
3Md. Rakib Hasan, Department of Information and Communication Technology, Comilla University, Cumilla, Bangladesh.
4Mahmuda Khatun, Department of Computer Science & Engineering, Comilla University, Cumilla – 3506, Bangladesh.
5Israt Jahan, Department of Computer Science & Engineering, Jahangirnagar University, Savar, Dhaka, Bangladesh.
Manuscript received on January 19, 2020. | Revised Manuscript received on January 27, 2020. | Manuscript published on February 10, 2020. | PP: 1777-1779 | Volume-9 Issue-4, February 2020. | Retrieval Number: D1727029420/2020©BEIESP | DOI: 10.35940/ijitee.D1727.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: To ensure security for the transmission of confidential information, Cryptographic algorithms play an important role in providing security against malicious attacks. Confidential information is exchanged among different organizations of the government. If the necessary security is not involved there, the information will be leaked due to un-trusted transmission, unattended nature and get access easily which can cause a disaster in the government system. In this research, my centre of attention is to prevent confidential information leakage in government organization using ISAKMP cryptographic technique. 
Keywords: Internet Security Association and Key Management Protocol (ISAKMP), Internet Key Exchange (IKE).
Scope of the Article:  Routing and transport protocols