Filters








166 Hits in 2.8 sec

Message Security Using a Combination of Hill Cipher and RSA Algorithms

Yogi Suryo Santoso
2021 Jurnal Matematika Dan Ilmu Pengetahuan Alam LLDikti Wilayah 1 (JUMPA)  
The methods used in this study are hybrid hill cipher and RSA cryptography.  ...  In this study it was shown that hybrid hill cipher cryptography with a 3x3 matrix key and RSA with a 512 bit key can overcome security issues when exchanging data so that messages sent cannot be read by  ...  MessageFigure 1 . 1 Hill cipher and RSA hybrid method encryption scheme Encryption RSA Ciphertext (Ciphertext,Encry pted Hill key, RSA public key) Figure 3 .Tabel 2 . 32 System Test ResultsFrom figure  ... 
doi:10.54076/jumpa.v1i1.38 fatcat:xob5rq746bfntdzi6dytxudona

Performance Analysis of Homomorphic Encryption algorithms for Cloud Data Security

Chandravathi D
2018 International Journal for Research in Applied Science and Engineering Technology  
The algorithms include Modified RSA (MRSA), RSA, Hybrid homomorphic encryption and hill cipher with respect to homomorphic encryption.  ...  This paper focuses on the performance analysis of different homomorphic encryption algorithms.  ...  algorithms.For a file size of 26 KB the encryption time of MRSA is 24 msecs, RSA is 27msecs and Hybrid and Hill cipher are 37 msecs.  ... 
doi:10.22214/ijraset.2018.3243 fatcat:e32yuu5kljf4bkxh7efzmva3mu

HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW

Nur Nabila Mohamed, Yusnani Mohd Yussof, Mohammed Ahmed Saleh, Habibah Hashim
2020 Journal of Information and Communication Technology  
On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption.  ...  Cryptography is described as the study of encrypting or secret writing of data using logical and mathematical principles to protect information.  ...  ACKNOWLEDGMENT The authors would like to thank the Ministry of Higher Education and the Research Management Institute, Universiti Teknologi MARA (UiTM)  ... 
doi:10.32890/jict2020.19.3.1 fatcat:dnur6fbzvve4jockrantiqwd5q

A Hybrid Encryption Algorithm Based on RSA Small-e and Efficient-RSA for Cloud Computing Environments

Faraz Fatemi Moghaddam, Maen T. Alrashdan, Omidreza Karimi
2013 Journal of Advances in Computer Networks  
Accordingly, this schema presents a Hybrid Encryption algorithm that is based on RSA Small-e and Efficient RSA (HE-RSA) for improving the reliability in cloud computing environments.  ...  Moreover,a dual encryption process has been applied in this algorithm to prevent common attacks against RSA algorithm.  ...  ACKNOWLEDGMENT We acknowledge the assistance and logistical support provided by Asia Pacific University of Technology and Innovation (A.P.U.) and Mr.ZailanArabee Bin Abdul Salam.  ... 
doi:10.7763/jacn.2013.v1.47 fatcat:rhtbc6vcrfefhan2knknt5ao44

A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines

Omid Mahdi Ebadati E., Farshad Eshghi, Amin Zamani
2020 CMES - Computer Modeling in Engineering & Sciences  
In this research, to improve the power of these algorithms, a new hybrid encryption algorithm for monitoring energy transmission lines and increasing the security of wireless sensor networks is proposed  ...  The proposed hybrid encryption algorithm provides the security and timely transmission of data in wireless sensor networks to monitor the transmission pipelines.  ...  Conflicts of Interest: I hereby declare that there is no conflict of interest related to this manuscript (article) entitled "Fusion of Medical Images in Wavelet Domain: A Hybrid Implementation" with manuscript  ... 
doi:10.32604/cmes.2020.08079 fatcat:thissiwhpvfyzbxf6pvic4n5x4

ANALISIS PERFORMA KRIPTOGRAFI HYBRID ALGORITMA BLOWFISH DAN ALGORITMA RSA

Sebastian Suhandinata, Reyhan Achmad Rizal, Dedy Ongky Wijaya, Prabhu Warren, Srinjiwi Srinjiwi
2019 JURTEKSI (Jurnal Teknologi dan Sistem Informasi)  
Therefore the purpose of this research is to measure the performance of the hybrid algorithm, consisting a symmetric keyBlowfish algorithm and an asymmetric key RSA algorithm, in encrypting and decrypting  ...  The result is the performance of the hybrid algorithm is almost on par with Blowfish and provides a more secure data encryption and decryption by taking advantage of RSA algorithm.  ...  S and V. Paul, "A Hybrid Crypto System Based On A New Cicle-Symmetric Key Algorithm And RSA With CRT Asymmetric pp. 14-18, 2011. [13] A. Alabaichi, F. Ahmad and R.  ... 
doi:10.33330/jurteksi.v6i1.395 fatcat:iapmvnforjce5l7ikewqcmhkpm

Encryption and Decryption Using Hybrid Cryptography Techniques and Multi-level Steganography

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Now this encrypted host image is further hidden inside another image by using one bit LSB algorithm.  ...  In this paper, three conventional key cryptography algorithms, which are Fibonacci series, XOR cipher and PN sequence encryption, are used along with RSA cryptography which is a public key cryptography  ...  The other segmented part is encrypted using RSA algorithm: For the given example, the RSA IV. CONCLUSION Data confidentiality has always been an area for research for the past few years.  ... 
doi:10.35940/ijitee.i7472.078919 fatcat:2f6zeyt2hvaovebmb5vbeivh2a

Performance analysis of encryption and decryption algorithm

Pronika Pronika, S. S. Tyagi
2021 Indonesian Journal of Electrical Engineering and Computer Science  
In this paper, we discuss different encryption and decryption algorithms and compare them with respect to time take by these algorithms for encrypting and decrypting different sizes of files.</p>  ...  , so it is always advisable to share and store data in encrypted form.  ...  In [23] , [24] discussed hybrid algorithm for healthcare system and used One Time Pad with RSA algorithm in cryptography techniques.  ... 
doi:10.11591/ijeecs.v23.i2.pp1030-1038 fatcat:3t6ufr4w45eohjykcxe22mh6iu

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

Prakash Kuppuswamy
2012 IOSR Journal of Computer Engineering  
This Research paper presents a new variant of digital signature algorithm which is based on linear block cipher or Hill cipher initiate with Asymmetric algorithm using mod 37.  ...  There are many other algorithms which are based on the hybrid combination of prime factorization and discrete logarithms, but different weaknesses and attacks have been developed against those algorithms  ...  completion of this research.  ... 
doi:10.9790/0661-0714752 fatcat:tbtvblputfg3pnhieuid4ojg3q

An analytical survey on the role of image cryptography and related computational methods

Vivek Ranjan, Kailash Patidar, Rishi Kushwaha
2020 International Journal of Advanced Computer Research  
Speed up image encryption by using RSA algorithm. In international conference on advanced computing and communication systems 2020 (pp. 1302-7). IEEE. [14] Duan X, Guo D, Liu N, Li B, Gou M, Qin C.  ...  Research on image scrambling method based on combination of arnold transform and exclusive-or operation.  ... 
doi:10.19101/ijacr.2020.10480104 fatcat:4gray5ozz5fefarsw3hwczwsci

A Modifying of Hill Cipher Algorithm with 3 Substitution Caesar Cipher

Azzam Mujaddid, Sumarsono Sumarsono
2017 Proceeding International Conference on Science and Engineering  
The hill cipher algorithm has the uniqueness of using matrix multiplication in the process where the key used is a matrix that has weaknesses in the process of encryption and decryption.  ...  The principle of the hill cipher algorithm using the multiplication of the 2x2 key matrix of keys is enhanced through process modification lies in the combination of initial character determination using  ...  The research by Annelis uses hybrid cryptography techniques using a combination of Caesar Cipher and RSA algorithms for message encoding.  ... 
doi:10.14421/icse.v1.294 fatcat:unq2gt6e5vgwbnphvwhthb4wty

An efficient image cryptography mechanism based on the hybridization of standard encryption algorithms

Vivek Ranjan, Kailash Patidar, Rishi Kushwaha
2020 ACCENTS Transactions on Information Security  
In our approach the combination of RC4 and Blowfish algorithms with chaos mapping (RC4BC) has been presented for the image encryption. In the first phase image dataset has been considered.  ...  Then substitution has been performed through RC4 encryption mechanism. The substitution has been performed based on 8 sub blocks for the first time.  ...  Speed Up image encryption by using RSA Algorithm. In international conference on advanced computing and communication systems 2020 (pp. 1302-7). IEEE. [14] Duan X, Guo D, Liu N, Li B, Gou M, Qin C.  ... 
doi:10.19101/tis.2020.517004 fatcat:bode4nyhwfb5zghmx7fflbjjwa

Private Searching on Encrypted Data in Cloud

Huda M., Hameed A.
2017 International Journal of Computer Applications  
This paper build secure and effective system for searching over encrypted images in cloud environment and propose public-key image encryption algorithm from RSA and Paillier algorithms.  ...  Many users prefer prior protection for their data using data encryption, which determine cloud popularity, since most searches process are not carry out on encrypted data directly.  ...  image encryption algorithm with RSA and Paillier algorithms.  ... 
doi:10.5120/ijca2017913924 fatcat:ulqsysq6uvbsbb2omyecbhul3q

AMPC: A Lightweight Hybrid Cryptographic Algorithm for Wireless Sensor Networks

Md. Navid Bin Anwar, Maherin Mizan Maha
2020 International Journal of Innovative Science and Research Technology  
To overcome these challenges a new hybrid cryptographic scheme, AES and Modified Playfair Cipher (AMPC), is introduced in this paper.  ...  Due to that, sensors become vulnerable to attacks and need strong security mechanism.  ...  previous work has been done on which merges the mentioned algorithm as hybrid.  ... 
doi:10.38124/ijisrt20jun975 fatcat:sb5utivnvvhaxehjo6zeuna5ee

Design and Implementation of New Encryption algorithm to Enhance Performance Parameters

Rajni Jain
2012 IOSR Journal of Computer Engineering  
Suggested algorithm is the combination of different type of operation (logical and mathematical) to perform encryption.  ...  Encryption and decryption is the process of cryptography technique which should be provided secrecy of the data over the network.  ...  is the combination of both classical encryption as well as modern technique, generally this type of technique referred as hybrid technique.  ... 
doi:10.9790/0661-0453339 fatcat:ipxffuqdgbgaxo5ag4yfpqywza
« Previous Showing results 1 — 15 out of 166 results