2016
DOI: 10.5120/ijca2016909863
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Cryptography Technique for Improving Network Security

Abstract: The security of network and the network data is primary aspect of the network providers and service providers. Therefore during the data exchange the cryptographic techniques are utilized for securing the data during various communications. On the other hand the traditional cryptographic techniques are well known and the attackers are known about the solution. Therefore new kind of cryptographic technique is required which improve the security and complexity of data cipher. In this paper a hybrid cryptographic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…V. Kapoor and al. [17] have produced a new hybrid cryptography technique to consolidate network security. K. G. Kadam and al.…”
Section: Related Workmentioning
confidence: 99%
“…V. Kapoor and al. [17] have produced a new hybrid cryptography technique to consolidate network security. K. G. Kadam and al.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, these schemes also applied in different application such as email [53], short message service (SMS) [54] and cloud computing [55]. Hybrid algorithm basically provide the integration between public key cryptography and private key cryptography schemes [56][57][58][59][60][61]; between public key cryptography schemes [62] or between private key cryptography schemes [63]. Most of the schemes in Hybrid algorithm were focused on security and, security and speed because of the integration of different cryptography schemes will strengthen the security mechanism by combining the strengths of encryption of each form [58], [60], [63].…”
Section: Figure 1 Public Key Cryptography Algorithms Classificationmentioning
confidence: 99%
“…Only those with connectivity to the secret key are able to decrypt (or decode) the communication into plain text. Despite the fact that today's encryption techniques are virtually impregnable, encrypted communications may sometimes be broken via cryptanalysis, also known as code-breaking 1) . As the Web and other forms of digital communication become more popular, digital security has become more important.…”
Section: Introductionmentioning
confidence: 99%