To see the other types of publications on this topic, follow the link: Digital Signature Algorithm confidentiality.

Journal articles on the topic 'Digital Signature Algorithm confidentiality'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Digital Signature Algorithm confidentiality.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dhanashree, Toradmalle, Muthukuru Jayabhaskar, and Sathyanarayana B. "Certificateless and provably-secure digital signature scheme based on elliptic curve." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 4 (2019): 3228–31. https://doi.org/10.11591/ijece.v9i4.pp3228-3231.

Full text
Abstract:
With the internet today available at the user’s beck, and call data or Information Security plays a vital role. Confidentiality, Integrity, Availability, and Non-repudiation are the pillars of security on which every application on the web is based on. With these basic requirements the users also need the security in low resource constrained environments making it more challenging for the security experts to design secured cryptographic algorithms. Digital Signatures play a pivotal role in Authentication. They help in verifying the integrity of the data being exchanged. Elliptical curves
APA, Harvard, Vancouver, ISO, and other styles
2

Toradmalle, Dhanashree, Jayabhaskar Muthukuru, and B. Sathyanarayana. "Certificateless and provably-secure digital signature scheme based on elliptic curve." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 4 (2019): 3228. http://dx.doi.org/10.11591/ijece.v9i4.pp3228-3231.

Full text
Abstract:
With the internet today available at the user’s beck, and call data or Information Security plays a vital role. Confidentiality, Integrity, Availability, and Non-repudiation are the pillars of security on which every application on the web is based on. With these basic requirements the users also need the security in low resource constrained environments making it more challenging for the security experts to design secured cryptographic algorithms. Digital Signatures play a pivotal role in Authentication. They help in verifying the integrity of the data being exchanged. Elliptical curves are t
APA, Harvard, Vancouver, ISO, and other styles
3

Octora Ginting, Ferraro S., Veithzal Rivai Zainal, and Aziz Hakim. "Digital Signature Standard Implementation Strategy by Optimizing Hash Functions Through Performance Optimization." Journal of Accounting and Finance Management 3, no. 6 (2023): 362–71. http://dx.doi.org/10.38035/jafm.v3i6.175.

Full text
Abstract:
Security method of data transmission process has been growing rapidly with the science of cryptography. Cryptography can provide security services that includes security aspects like confidentiality, data integrity, authentication and non-repudiation. Modern cryptography uses a key that must be kept secret to overcome the problem of cryptographic security. Problem in the use of the same key by two entities that communicate with each other in exchanging messages is a way to distribute the key. This problem can be overcome by using public-key cryptography, which allows users to communicate secur
APA, Harvard, Vancouver, ISO, and other styles
4

Hoang, Sy Tuong, Quang Trung Do, and Nhu Quynh Luc. "Build a Blockchain-based confidentiality and privacy solution using cryptographic techniques." Ministry of Science and Technology, Vietnam 65, no. 3 (2023): 1–6. http://dx.doi.org/10.31276/vjst.65(3).01-06.

Full text
Abstract:
This study aims to apply security problems such as homomorphic encryption algorithm, elliptic curve digital signature algorithm, and secure hash algorithms in building your own bitcoin virtual currency based on the Blockchain system; while still ensuring the confidentiality and privacy of the generated bitcoin virtual currency. The result achieved by the author team, who created their virtual currency bitcoin, has integrated security techniques (including secure hash algorithms with a length size of 256 bits; elliptic curve digital signature algorithm with a length size of 384 bits; full homom
APA, Harvard, Vancouver, ISO, and other styles
5

Nadzifarin, Aulia, and Asmunin Asmunin. "Penerapan Elliptic Curve Digital Signature Algorithm pada Tanda Tangan Digital dengan Studi Kasus Dokumen Surat – Menyurat." Journal of Informatics and Computer Science (JINACS) 4, no. 01 (2022): 1–9. http://dx.doi.org/10.26740/jinacs.v4n01.p1-9.

Full text
Abstract:
Changes in the pattern of human life through electronic digital media are the impact of very rapid technological developments, one of which is the change in patterns from paper to paperless. At the same time as the COVID-19 pandemic, which affected policies in most areas of employment and education, this was done online, so electronic documents were often used in every process in these fields. As in the case of administrative correspondence or other document exchange transactions. And the authenticity of the document is needed by using a mechanism, one of which is a digital signature. Digital
APA, Harvard, Vancouver, ISO, and other styles
6

Indah Lestari, Rahayu, Vera Suryani, and Aulia Arif Wardhana. "Digital Signature Method to Overcome Sniffing Attacks on LoRaWAN Network." International journal of electrical and computer engineering systems 13, no. 7 (2022): 533–39. http://dx.doi.org/10.32985/ijeces.13.7.5.

Full text
Abstract:
LoRa or Long Range with LoRaWAN technology is a protocol for low-power wireless networks. The absence of an encryption process on the data payload becomes a challenge for the LoRaWAN network. When the process of sending messages is running inter devices, sniffing might occur, thereby reducing the confidentiality aspect of the data communication process. This paper optimized the digital signature method to secure messages sent by LoRaWAN network devices, along with Advanced Encryption Standard (AES) algorithm and Ed25519 algorithm. AES was used for message encryption, while Ed25519 was used for
APA, Harvard, Vancouver, ISO, and other styles
7

MUSTAFA, HUSSEIN, ELHADY MAHMOUD ABD, HAMDY SARA, and ALSOBKY WAGEDA. "DESIGNING NEW TECHNIQUE IN DIGITAL SIGNATURE BASED ON GALOIS FIELD 2n AND CHAOTIC MAPS." Seybold Report Journal 18, no. 09 (2023): 53–72. https://doi.org/10.5281/zenodo.8344314.

Full text
Abstract:
Abstract Ensuring the utmost security, confidentiality, and integrity of digital communications has become an imperative requirement in today's world. This realization highlights the significance of employing Digital Signature Algorithms (DSA) in various online applications. DSA's true value lies in its ability to deliver secure digital signatures, assuring the verification of digital documents, messages, or transactions. This aspect holds paramount importance in critical domains such as online banking, e-commerce, digital contracts, and government services where safeguarding sensitive
APA, Harvard, Vancouver, ISO, and other styles
8

Paulus, Erick, and Mochamad Azmi Fauzan. "A Framework to Ensure Data Integrity and Safety." Data Science: Journal of Computing and Applied Informatics 2, no. 1 (2018): 1–11. http://dx.doi.org/10.32734/jocai.v2.i1-90.

Full text
Abstract:
The technology development allows people to more easily communicate and convey information. The current communication media can facilitate its users to send and receive digital data, such as text, sound or digital image. But in terms of security, communications media not always ensure the confidentiality and authentication of data traffic. Most people rely solely on the security provided by the communications media providers in securing their data, which is essentially still inadequate. This paper presents the development of a data security framework by applying the principles of cryptography
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Feifei, and Guohong Shi. "Application Research in Computer Vision Signature Encryption System of Enterprise Contract Economic Management." Wireless Communications and Mobile Computing 2022 (May 13, 2022): 1–5. http://dx.doi.org/10.1155/2022/9677942.

Full text
Abstract:
This paper mainly proposes a nonrepudiation digital signature authentication scheme based on an enterprise contract computer vision system. Based on the RSA algorithm and MD5 message-digest algorithm, a digital signature scheme of enterprise economic contract based on IC card is proposed. The method realizes digital signature and ensures the confidentiality of the transmitted data. Finally, this paper proposes a concrete digital signature experiment system implemented in Java. The results of this study show that the computer vision signature encryption system helps to improve the reliability o
APA, Harvard, Vancouver, ISO, and other styles
10

Sihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.

Full text
Abstract:
Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman) algorithm. The advantages of hybrid cryptography is the speed in processing data using
APA, Harvard, Vancouver, ISO, and other styles
11

Kumar, Pankaj, Saurabh Kumar Sharma, and Kaveri Umesh Kadam. "Empirical Evaluation of ECC Batch Verification Algorithms of Digital Signature in Wireless Sensor Network." Electronics ETF 26, no. 2 (2022): 53–64. http://dx.doi.org/10.53314/els2226053k.

Full text
Abstract:
Wireless sensor network (WSN) is an emerging topic in wireless communication where various sensor nodes are connected over the internet for data exchange. Exchanging the information over the WSN is very critical; therefore, it requires authentication and security mechanisms to ensure integrity and confidentiality. To avoid unauthorized use of WSN, the authentication through a digital signature turns into an essential task in WSN. Verification of individual signature is taking too much time and it is not suitable for wireless sensor network. Digital signature verification time can be reduced by
APA, Harvard, Vancouver, ISO, and other styles
12

Nuraeni, Fitri, Dede Kurniadi, and Diva Nuratnika Rahayu. "IMPLEMENTATION OF RSA AND AES-128 SUPER ENCRYPTION ON QR-CODE BASED DIGITAL SIGNATURE SCHEMES FOR DOCUMENT LEGALIZATION." Jurnal Teknik Informatika (Jutif) 5, no. 3 (2024): 675–84. https://doi.org/10.52436/1.jutif.2024.5.3.1426.

Full text
Abstract:
Maintaining the confidentiality and integrity of electronic documents is essential in the modern digital age. In the contemporary digital world, digital signatures are essential for safeguarding and legalizing electronic documents. The current issue, however, goes beyond digital signatures and instead centers on enhancing security and data integrity. Therefore, RSA and AES-128 super-encryption is required in QR-code-based digital signature techniques for document legalization. This research stage entails constructing a super encryption algorithm, testing it experimentally for security and perf
APA, Harvard, Vancouver, ISO, and other styles
13

Susilawati Mohamad, Fatma, Fadi Mohammad Alsuhimat, Mohamad Afendee Mohamed, Mumtazimah Mohamad, and Azrul Amri Jamal. "Detection and Feature Extraction for Images Signatures." International Journal of Engineering & Technology 7, no. 3.28 (2018): 44. http://dx.doi.org/10.14419/ijet.v7i3.28.20963.

Full text
Abstract:
The signing process is one of the most important processes used by organizations to ensure the confidentiality of information and to protect it against any unauthorized penetration or access to such information. As organizations and individuals enter the digital world, there is an urgent need for a digital system capable of distinguishing between the original and fraud signature, in order to ensure individuals authorization and determine the powers allowed to them. In this paper, three widely used feature detection algorithms, HARRIS, BRISK (Binary Robust Invariant Scalable Keypoints) and FAST
APA, Harvard, Vancouver, ISO, and other styles
14

Yusuf, Hasril, Afriyudi Afriyudi, and Hadi Syaputra. "Digital Signature Pada Citra Digital Menggunakan Algoritma Rc6 Studi Kasus: Dokumen Kartu Keluarga." Journal of Computer and Information Systems Ampera 1, no. 1 (2020): 44–52. http://dx.doi.org/10.51519/journalcisa.v1i1.4.

Full text
Abstract:
The confidentiality of a document is an important requirement for the people of this age to protect their privacy from people who have no right to know it. To overcome this, an application that can encrypt document files in the form of digital images is needed so that it is not known by others. . The algorithm that has been developed in this study we use the RC6 algorithm as an algorithm method. The purpose of this system will be to help specifically in the administration section to enter or store documents, find and create reports that will be seen by government installations in an encrypted
APA, Harvard, Vancouver, ISO, and other styles
15

David, Shibin, and G. Jaspher W. Kathrine. "Digital Signature Algorithm for M-Payment Applications Using Arithmetic Encoding and Factorization Algorithm." Journal of Cases on Information Technology 23, no. 3 (2021): 11–26. http://dx.doi.org/10.4018/jcit.20210701.oa2.

Full text
Abstract:
Mobile communication systems employ an encoding-encryption model to ensure secure data transmission over the network. This model encodes the data and encrypts it before transmitting it to the receiver's end. A non-trivial operation is performed to generate a strong secret key through which the data is encrypted. To support the security level of this model, arithmetic encoding is performed upon the data before encryption. The encrypted data is hashed using a lightweight hashing algorithm to generate a small and fixed length hash digest to overcome the overheads before it is communicated to the
APA, Harvard, Vancouver, ISO, and other styles
16

Lin, Baode, Zhenwei Geng, and Fengrong Yu. "Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data." Journal of Electrical and Computer Engineering 2023 (February 17, 2023): 1–10. http://dx.doi.org/10.1155/2023/6853902.

Full text
Abstract:
This work aims to solve the specific problem in the Power Internet of Things (PIoT). PIoT is vulnerable to monitoring, tampering, forgery, and other attacks during frequent data interaction under the background of big data, leading to a severe threat to the power grid’s Information Security (ISEC). Cryptosystems can solve ISEC problems, such as confidentiality, data integrity, authentication, identity recognition, data control, and nonrepudiation. Thereupon, this work expounds on cryptography from public-key encryption and digital signature and puts forward the model of network information att
APA, Harvard, Vancouver, ISO, and other styles
17

Hendry Leo Kanickam, S., and L. Jayasimman. "Comparative Analysis of Hash Authentication Algorithms and ECC Based Security Algorithms in Cloud Data." Asian Journal of Computer Science and Technology 8, no. 1 (2019): 53–61. http://dx.doi.org/10.51983/ajcst-2019.8.1.2118.

Full text
Abstract:
Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC (Elliptic Curve Cryptography) and Authentication of data integrity using hashing alg
APA, Harvard, Vancouver, ISO, and other styles
18

Penubadi, Harshavardhan Reddy, Pritesh Shah, Ravi Sekhar, et al. "Sustainable electronic document security: a comprehensive framework integrating encryption, digital signature and watermarking algorithms." Heritage and Sustainable Development 5, no. 2 (2023): 391–404. http://dx.doi.org/10.37868/hsd.v5i2.359.

Full text
Abstract:

 
 
 
 Protecting electronic documents, especially those containing sensitive data, is a major challenge in an open web. The data security industry has long struggled to manage the security of e-books, data shows that information security issues can cause significant economic losses after three years Although cryptographic methods have been proposed as a solution in of these challenges Focusing on speed and efficiency The shortcomings of traditional encryption methods have been thoroughly examined Although a number of network management techniques assure retention privacy
APA, Harvard, Vancouver, ISO, and other styles
19

Chen, Zao. "Federated Learning based on Homomorphic Encryption and Digital Signatures." Highlights in Science, Engineering and Technology 39 (April 1, 2023): 595–603. http://dx.doi.org/10.54097/hset.v39i.6596.

Full text
Abstract:
Federated learning aims to train a centralized federated model using decentralized data sources and to ensure the security and privacy of user data during system training process. Federal learning still faces four challenges: high communication costs, system heterogeneity, data heterogeneity, and data security, The primary attacks facing federal learning include confidentiality, integrity, and usability attacks. Attackers mainly target confidential attacks, while malicious attackers target integrity attacks and usability attacks. Homomorphism encryption refers to the encryption algorithm that
APA, Harvard, Vancouver, ISO, and other styles
20

Devendra, Dandekar Pranjali Dandekar Rohanak Pawar Nikhil Kamble Sandip Patil. "Document Verification System in Blockchain Technique by using Hash & Digital Signature Algorithm." International Journal of Advanced Innovative Technology in Engineering 10, no. 2 (2025): 145–52. https://doi.org/10.5281/zenodo.15423140.

Full text
Abstract:
The use of blockchain technology is a game changer in improving the security and transparency of verifying documents and likewise in enhancing efficiency for such processes. The paper proposes a document-verification system using technology on the Polygon Blockchain: an environment-friendly Layer 2 solution on the Ethereum platform. The system is aimed at addressing issues such as document tampering, forgery, and inefficiencies in traditional verification methods by offering them in a secure and transparent environment. The validation process for several documents, such as academic certificate
APA, Harvard, Vancouver, ISO, and other styles
21

Mark Espalmado, John, and Edwin Arboleda. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 1032. http://dx.doi.org/10.11591/ijece.v7i2.pp1032-1041.

Full text
Abstract:
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength an
APA, Harvard, Vancouver, ISO, and other styles
22

Jean Pierre Ntayagabiri, Jeremie Ndikumagenge, Youssef Bentaleb, and Hind El Makhtoum. "Comparative Analysis of Elliptic Curve-Based Cryptographic Approaches for Internet of Things Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1077–92. https://doi.org/10.32628/cseit2410457.

Full text
Abstract:
The rapid expansion of the Internet of Things (IoT) introduces significant security challenges, given the resource-constrained nature of most IoT devices. To address these challenges, elliptic curve cryptography (ECC) has emerged as a promising solution due to its ability to deliver high levels of security with shorter key lengths, making it highly efficient for devices with limited computational power and memory. This paper focuses on a comparative analysis of three widely used ECC-based cryptographic algorithms: Elliptic Curve Digital Signature Algorithm (ECDSA), Elliptic Curve Integrated En
APA, Harvard, Vancouver, ISO, and other styles
23

John, Mark B. Espalmado, and R. Arboleda Edwin. "DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 1032–41. https://doi.org/10.11591/ijece.v7i2.pp1032-1041.

Full text
Abstract:
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength an
APA, Harvard, Vancouver, ISO, and other styles
24

ЛАВРИК, ІВАН. "ДОСЛІДЖЕННЯ АЛГОРИТМІВ ПОСТКВАНТОВОГО ЦИФРОВОГО ПІДПИСУ". Herald of Khmelnytskyi National University. Technical sciences 333, № 2 (2024): 361–69. http://dx.doi.org/10.31891/2307-5732-2024-333-2-56.

Full text
Abstract:
The continuous development of quantum computing requires the development of cryptographic algorithms resistant to quantum cryptanalysis. Therefore, the National Institute of Standards and Technology (NIST) is holding a competition to standardize algorithms in the post-quantum period, including Crystals-Dilithium, Falcon, and Sphincs+ for digital signatures. In order to determine the ways of development and ways to improve the existing methods of cryptographic protection and electronic digital signature (EDS), an urgent task arose to assess the effectiveness (stability and computational complex
APA, Harvard, Vancouver, ISO, and other styles
25

Dr.Yakubu, Ajiji Maker. "The Importance of Cryptography in Digital Signatures." International Journal of Information Technology 3, no. 8 (2020): 1–12. https://doi.org/10.5281/zenodo.3685178.

Full text
Abstract:
Information is an organization’s most valuable asset. As we have seen in previous security and risk management is data-centric. The efforts to protect systems and networks attempt to achieve, data availability, confidentiality. Integrity, and the IP address of the devices that signed, we also saw no infrastructure security controls are not 100% effective. In reaction layered security model, it often necessary to underlying implement one final prevention control wrapped around sensitive information, Encryption is not a security panacea not solve all your data-centric security issues. This
APA, Harvard, Vancouver, ISO, and other styles
26

Rushda, Naushad Dakhni, and I. Sandilkar Saniya. "Implementation of RSA Algorithm for Encryption and Decryption Recent Technology Trends in Computer Technology." International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) 3, no. 19 (2023): 66–70. https://doi.org/10.5281/zenodo.8133459.

Full text
Abstract:
Cryptographic technique is one of the principal means to protect information security. Not only has it to ensure the information confidential, but also provides digital signature, authentication, secret substorage, system security and other functions. Therefore, the encryption and decryption solution can ensure the confidentiality of the information, as well as the integrity of information and certainty, to prevent information from tampering, forgery and counterfeiting. Encryption and decryption algorithm's security depends on the algorithm while the internal structure of the rigor of math
APA, Harvard, Vancouver, ISO, and other styles
27

Sadikin, Mohamad Ali, and Rini Wisnu Wardhani. "Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application." CommIT (Communication and Information Technology) Journal 10, no. 2 (2016): 63. http://dx.doi.org/10.21512/commit.v10i2.1549.

Full text
Abstract:
This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR) application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the med
APA, Harvard, Vancouver, ISO, and other styles
28

Patil, Girish, Kartik Nillawar, Mohit Khatri, Sachin Shetkar, and Snehal Shinde. "Smart Way for Prescribing Medication." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6795–800. http://dx.doi.org/10.22214/ijraset.2023.53317.

Full text
Abstract:
Abstract: This research addresses the implementation of digital signature technique for electronic prescription to prevent cybercrime problem such as robbery, modification and unauthorized access. In this research, RSA 2048-bit algorithm will be implemented in Java programming and android based system. Secure Electronic Prescription (SEP) application design is intended to combine given services, such as confidentiality, authentication, and non-repudiation. Cryptography is used to ensure the prescription file and QR-Code for detailed information on the prescription that have been given only for
APA, Harvard, Vancouver, ISO, and other styles
29

Gour, Ayush, Simarjit Singh Malhi, Gursharan Singh, and Gursimran Kaur. "Hybrid Cryptographic Approach: For Secure Data Communication using Block Cipher Techniques." E3S Web of Conferences 556 (2024): 01048. http://dx.doi.org/10.1051/e3sconf/202455601048.

Full text
Abstract:
In our rapidly evolving digital age, where data is the lifeblood of businesses and individuals alike, safeguarding sensitive information and ensuring secure communication channels has become paramount. This research paper introduces a novel hybrid cryptographic algorithm designed to address the multifaceted challenges of data security and secure communication. The proposed algorithm leverages the beneficial features of symmetric and asymmetric encryption approaches, developing a way for robust and adaptable security solutions. This hybrid algorithm begins by utilizing a state-of-the-art symmet
APA, Harvard, Vancouver, ISO, and other styles
30

Sharma, Arvind K., and Sudesh K. Mittal. "Cryptographic Keyed Hash Function: PARAŚU-256." Journal of Computational and Theoretical Nanoscience 17, no. 11 (2020): 5072–84. http://dx.doi.org/10.1166/jctn.2020.9343.

Full text
Abstract:
Cryptography has distinct paramount significance in interconnected environment where whether we concern about ‘Computer-Security,’ ‘Information-Security,’ ‘Network-Security’ etc., doesn’t matters and, ingredients of this particular branch of computer science viz. ‘Encryption/Decryption’ systems, ‘Hash-Functions,’ ‘Digital-Signatures’ etc. also playing vital role from years in order to manage ‘Confidentiality,’ ‘Integrity’ and ‘Authenticity’ of resources. The Encryption/Decryption Cryptosystems managing the Confidentiality and Hash-Functions are fully devoted towards to look after the Integrity
APA, Harvard, Vancouver, ISO, and other styles
31

Bourair, Bourair, Noora zidan .., Bourair Al Al-Attar, Hussein A. Hussein Al Naffakh, and J. F. F.Tawfeq. "Implementation of novel cryptographic technique for enhancing the cipher security for Resilient Infrastructure." Fusion: Practice and Applications 15, no. 1 (2024): 32–44. http://dx.doi.org/10.54216/fpa.150103.

Full text
Abstract:
Cryptography is a well-known technology for providing confidential data transfer via asymmetric or symmetric algorithms with public or private keys. Secure data transmission over networks using unreliable, untrusted channels is made achievable by cryptography. As a result of the quick digital transition, network traffic is rapidly rising, and consumers remain constantly connected and accessible online. Extortions, including transforming, spoofing, and tracking data through unauthorised access, are quite widespread over the internet. Many more cryptographic algorithms already exist, but they ne
APA, Harvard, Vancouver, ISO, and other styles
32

Houari, Nawal Sad, Fatima Kabli, and Affaf Matoug. "Integration of IMEI, RSA, and Signature to Secure Communication in Mobile Applications." International Journal of Organizational and Collective Intelligence 12, no. 1 (2022): 1–18. http://dx.doi.org/10.4018/ijoci.306979.

Full text
Abstract:
The mobile instant messaging applications have become a famous wireless service in the world allowing a user to communicate with anyone in anywhere. Consequently, the manipulation of the user data creates a pressing need for securing the information and the associated technologies. The protection of these communications has become a paramount objective. The concept of cryptography has become a basic concept in communication and the exchange of messages within companies. This paper presents a hybrid security system allowing messages to be exchanged within a company in a secure manner. Our goal
APA, Harvard, Vancouver, ISO, and other styles
33

Khalid, Zhwan Mohammed, and Shavan Askar. "Resistant Blockchain Cryptography to Quantum Computing Attacks." International Journal of Science and Business 5, no. 3 (2021): 116–25. https://doi.org/10.5281/zenodo.4497732.

Full text
Abstract:
Due to the need to maintain confidentiality, redundancy, and openness, the usage of Blockchain and other DLTs has dramatically advanced in recent years, and is being recommended for various applications. In blockchain, these capabilities are supplied by means of hash functions and public-key encryption. However, the rapid development of quantum computation in the near future has opened the door to the Grover and Shor algorithms. These algorithms challenge both public and hash encryption, causing blockchains to redesign and use quantum attack-tolerant cryptosystems; this produces cryptosystems
APA, Harvard, Vancouver, ISO, and other styles
34

Harsh Verma. "Hybrid Data Integrity Verification for Real-Time IoT Systems Using AEAD and VRF with ECDSA." Journal of Information Systems Engineering and Management 10, no. 34s (2025): 855–67. https://doi.org/10.52783/jisem.v10i34s.5875.

Full text
Abstract:
With the rapid growth of the Internet of Things (IoT), maintaining data integrity, confidentiality, and authentication is now an imperative challenge. Most conventional cryptographic solutions cannot satisfy the specific constraints of IoT environments, which include limited computational resources, energy efficiency, and scalability. This study proposes a lightweight hybrid cryptographic framework combining Authenticated Encryption with Associated Data (AEAD) and Verifiable Random Functions (VRF) with Elliptic Curve Digital Signature Algorithm (ECDSA). The hybrid framework is intended to offe
APA, Harvard, Vancouver, ISO, and other styles
35

Satrasupalli, Sivaji, and S. Vishnu. "An Encryption Algorithm for Enhanced Image Security." International Journal of Engineering and Advanced Technology 9, no. 1s5 (2019): 81–84. http://dx.doi.org/10.35940/ijeat.a1020.1291s519.

Full text
Abstract:
Image security finds its applications in many areas such as bio-metric, digital signatures, watermarking, confidentiality of medical and data in transit. It has become necessary to secure the images in order to protect the confidential data. Cryptography is one of the methodologies through which image data can be secured for storing or transmission purposes by encrypting the same and decrypt it when needed. The main challenge in image encryption is generating cipher which takes less computational without compromising the security. In this paper, we present a symmetric encryption algorithm whic
APA, Harvard, Vancouver, ISO, and other styles
36

Tsai, Chwei-Shyong, Hsin-Liang Chen, Hsien-Chu Wu, and Josh Jia-Ching Ying. "A Puzzle-Based Data Sharing Approach with Cheating Prevention Using QR Code." Symmetry 13, no. 10 (2021): 1896. http://dx.doi.org/10.3390/sym13101896.

Full text
Abstract:
The information technique has developed rapidly. The technique of QR codes is widely applied in our daily life, and the mechanism is suitable to share data. A QR code uses symmetric encryption to store and retrieve data efficiently. However, the security issues of QR codes are seldom discussed by the wider community. Moreover, if the sender wishes only the authorized participant to attain the private data which are shared, the data must be encrypted. Furthermore, we do not know who should be censured when problems arise. In view of this, to maintain the integrity and the confidentiality of inf
APA, Harvard, Vancouver, ISO, and other styles
37

J., Williams,, Bennett, E. O., and Anireh, V.I.E. "An efficient algorithm for text encryption on android devices." International Journal of Engineering and Computer Science 13, no. 07 (2024): 26229–35. http://dx.doi.org/10.18535/ijecs/v13i07.4843.

Full text
Abstract:
In the era of digital communication, ensuring the confidentiality and integrity of sensitive information is paramount. This dissertation introduces a robust text encryption system that combines the strengths of Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms to create a hybrid encryption approach. Object Oriented Design (OOD) was used for the design methodology. The proposed system leverages the efficiency of AES for symmetric key encryption and the security benefits of RSA for key exchange and digital signatures. The encryption process begins with the generation
APA, Harvard, Vancouver, ISO, and other styles
38

Esh Narayan. "Cryptography Security of Digital Signals using Golden Matrix with Recurrence Relations." Journal of Information Systems Engineering and Management 10, no. 14s (2025): 845–56. https://doi.org/10.52783/jisem.v10i14s.2400.

Full text
Abstract:
Modern cryptography is a field of study and practice that involves creating secure communication and data protection systems. Its primary goal is to ensure authenticity, integrity, and confidentiality of information in the presence of adversaries or potential attackers. Digital signatures are a crucial component of modern cryptography, providing validation, data privacy protection in digital communication. These are used to verify the authenticity of a digital message or document and ensure that no changes have been made to it since the signature was applied. . We can explore new methods for s
APA, Harvard, Vancouver, ISO, and other styles
39

Akanksha, Tomar* Jamwant Kumbhre. "SURVEY ON CLOUD SECURITY BY DATA ENCRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 992–97. https://doi.org/10.5281/zenodo.225383.

Full text
Abstract:
Cloud computing is one of the latest technology trend of the IT trade for business area. Cloud computing security converged into a demanding topic in the sector of information technology and computer science research programs. Cloud Computing is a conceptual service based technology which is used by many companies widely these days. Elliptical Curve Cryptography based algorithm provides a highly secure communication, data integrity and authentication, along with the non-repudiation communication and data confidentiality. Elliptical Curve Cryptography is known as a public key encryption techniq
APA, Harvard, Vancouver, ISO, and other styles
40

VENKATESWARAN, N. "A SECURE BLOCKCHAIN FRAMEWORK FOR COLLABORATIVE SERVICE." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04609.

Full text
Abstract:
Abstract: With the rapid development of cloud computing, a large number of web services have been emerging quickly, which brings a heavy burden for users to choose the services they preferred. In order to suggest web services for users, recommendation algorithms are needed and many of them have been investigated recently. However, most of the existing recommendation schemes are based on centralized historical data, which may lead to single point of failure. Generally, the data contains a lot of sensitive information that cloud may expose the privacy of users, which makes most cloud platforms r
APA, Harvard, Vancouver, ISO, and other styles
41

AlShalaan, Manal Rajeh, and Suliman Mohamed Fati. "Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy." Information 14, no. 5 (2023): 275. http://dx.doi.org/10.3390/info14050275.

Full text
Abstract:
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data through their personal devices. Although the BYOD practice implies plenty of advantages, this also opens the door to a variety of security risks. This study investigates these security risks and proposes a complementary encryption approach with a digital signature that uses symmetric and asymmetric algorithms, depending on the organization’s digi
APA, Harvard, Vancouver, ISO, and other styles
42

Shaaban, Mohamed Ali, Almohammady S. Alsharkawy, Mohammad T. AbouKreisha, and Mohammed Abdel Razek. "Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment." International journal of Computer Networks & Communications 15, no. 04 (2023): 55–71. http://dx.doi.org/10.5121/ijcnc.2023.15404.

Full text
Abstract:
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several threats, such as latency, security, network failure, and performance. These issues are solved with the development of fog computing, which brings storage and computation closer to IoT-devices. However, there are several challenges faced by security designers, engineers, and researchers to secure this environment. To ensure the confidentiality of data that passes between the connected devices, digital signature protocols have been applied to the authentication of identities and messages. However, in the
APA, Harvard, Vancouver, ISO, and other styles
43

VS, Barath. "Secured Folder Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 121–29. http://dx.doi.org/10.22214/ijraset.2024.64953.

Full text
Abstract:
In today's digital world, when sensitive data is routinely targeted by thieves, strong encryption technologies are critical for preventing breaches and ransomware attacks. Our research solves this need by creating a Secure Folder Encryption System that employs AES-GCM (Advanced Encryption Standard - Galois/Counter Mode) and HMAC (Hash-based Message Authentication Code) to secure data confidentiality and integrity when stored on cloud servers. Drawing on research on ECG image file encryption using ECDH and AES-GCM, we choose AES-GCM for its high resistance to manipulation and unauthorized acces
APA, Harvard, Vancouver, ISO, and other styles
44

Prasad, V. Hari, Mohammed Rafi, Mohammad Khaleel Ahmed, Ashraf Ben Miled, and Mahammad Shabana. "Random Self-Generative Schnorr Certificate less Signcryption for Secure Data Sharing in Mobile Cloud Environments." WSEAS TRANSACTIONS ON COMPUTER RESEARCH 13 (April 10, 2025): 270–80. https://doi.org/10.37394/232018.2025.13.25.

Full text
Abstract:
To deliver applications and services required by mobile devices, mobile cloud computing adopts cloud computing. Cloud computing assists data sharing among authorized users through data stored on cloud servers. Data sharing implies distributing data resources to multiple users or applications with the utmost security. But maintaining security while transferring data in cloud computing is an important challenge. In conventional algorithms, data sharing in a secure environment and control policies in accessing the data for authorized users are the biggest concerns to deal with. To handle these se
APA, Harvard, Vancouver, ISO, and other styles
45

Kim, Dohoon, Sang Seo, Heesang Kim, Won Gi Lim, and Youn Kyu Lee. "A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard." Applied Sciences 10, no. 24 (2020): 8999. http://dx.doi.org/10.3390/app10248999.

Full text
Abstract:
Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability-related limitations when applied to tactical data link (TDL) and multi-TDL networks (MTN). This is because TDL and MTN require maximum tactical security, communication integrity, and low network overhead based on many protocol header bits for rapid communication with limited network resources. The application of such authentication algorithms to TD
APA, Harvard, Vancouver, ISO, and other styles
46

Hafeez, Muhammad Asfand, Kazi Hassan Shakib, and Arslan Munir. "A Secure and Scalable Authentication and Communication Protocol for Smart Grids." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 11. https://doi.org/10.3390/jcp5020011.

Full text
Abstract:
The growing adoption of smart grid systems presents significant advancements in the efficiency of energy distribution, along with enhanced monitoring and control capabilities. However, the interconnected and distributed nature of these systems also introduces critical security vulnerabilities that must be addressed. This study proposes a secure communication protocol specifically designed for smart grid environments, focusing on authentication, secret key establishment, symmetric encryption, and hash-based message authentication to provide confidentiality and integrity for communication in sma
APA, Harvard, Vancouver, ISO, and other styles
47

Nurcahya, Saputra Dwi, Dian Nazelliana, and Purwanti . "Implementasi Algoritma Kriptografi Chiper Simetris Menggunakan Bahasa Pemrograman PHP." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 8, no. 2 (2025): 1084–89. https://doi.org/10.32672/jnkti.v8i2.8989.

Full text
Abstract:
Abstrak - Dalam dunia sekarang ini, kemajuan teknologi di bidang komputer dan telekomunikasi berkembang sangat pesat. Lalu lintas pengiriman data dan informasi yang semakin global, serta konsep open system dari suatu jaringan memudahkan seseorang untuk masuk ke dalam jaringan tersebut. Hal tersebut dapat membuat proses pengiriman data menjadi tidak aman dan dapat saja dimanfaatkan oleh pihak lain yang tidak bertanggung jawab, yang mengambil informasi atau data yang dikirimkan tersebut di tengah perjalanan. Maka dibutuhkan suatu sistem keamanan yang dapat menjaga kerahasiaan suatu data, sehingg
APA, Harvard, Vancouver, ISO, and other styles
48

Benmenzer, Faiza, and Rachid Beghdad. "Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–20. http://dx.doi.org/10.4018/ijisp.307072.

Full text
Abstract:
Many encryption strategies have been applied to ensure data confidentiality and improve cloud security. The most recent cryptosystems are based on homomorphic (HE), attribute-based (ABE), and hybrid encryption. However, most of them suffer from numerous drawbacks: high time consumption, encrypted message size, and some vulnerabilities. Hence, a secure method is highly required to get a satisfying security level while keeping the computational complexity reduced. This paper outlines a novel technique that combines elliptic curve cryptography (ECC) and Blockchain technology. The data is first en
APA, Harvard, Vancouver, ISO, and other styles
49

Chen, Jiaoyue, Qihui Zuo, Wenquan Jin, Yujing Wu, Yihu Xu, and Yinan Xu. "Study of Network Security Based on Key Management System for In-Vehicle Ethernet." Electronics 13, no. 13 (2024): 2524. http://dx.doi.org/10.3390/electronics13132524.

Full text
Abstract:
With the rapid development of vehicle electronic communication technology, in-vehicle bus network system communicates with external electronic devices such as mobile phones and OBD II, causing in-vehicle bus networks to face severe network security threats. This study aims to explore the security scheme of in-vehicle bus networks based on a key management system to ensure the confidentiality, integrity, authenticity, and availability of vehicle communication, and innovatively propose a key management system. This key management system uses data encryption and signature algorithms based on the
APA, Harvard, Vancouver, ISO, and other styles
50

Ambareen, Javeria, M. Prabhakar, and Tabassum Ara. "LEES: a Hybrid Lightweight Elliptic ElGamal-Schnorr-Based Cryptography for Secure D2D Communications." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 24–30. http://dx.doi.org/10.26636/jtit.2021.146020.

Full text
Abstract:
Device-to-device (D2D) communications in 5G networks will provide greater coverage, as devices will be acting as users or relays without any intermediate nodes. However, this arrangement poses specific security issues, such as rogue relays, and is susceptible to various types of attacks (impersonation, eavesdropping, denial-of-service), due to the fact that communication occurs directly. It is also recommended to send fewer control messages, due to authenticity- and secrecy related prevailing requirements in such scenarios. Issues related to IoT applications need to be taken into consideration
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!