become the most easily accessible yet very valuable commodity. Since the successful
implementation of various electronic mechanisms like E-Governance, E-Commerce, E-
Learning, E-Health, M-Governance, M-Insurance, etc are totally dependable on the security
and authenticity of the information, it is very much susceptible to interceptions and
alterations caused by the hackers. In this paper the authors have done a through study of the …