2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) 2020
DOI: 10.1109/iccmc48092.2020.iccmc-000145
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Encryption Approach for Secured Authentication and Enhancement in Confidentiality of Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…In n-bit keys are separated into two parts: the key's rst half is used as encryption keys, and the key's other half is used for modifying the algorithm. The security performance of Two sh is better than AES [17,18]. Two sh compared with AES, both algorithms may support key sizes of 128, 192, and 256-bit.…”
Section: Two Sh and Aes Integrationmentioning
confidence: 99%
See 1 more Smart Citation
“…In n-bit keys are separated into two parts: the key's rst half is used as encryption keys, and the key's other half is used for modifying the algorithm. The security performance of Two sh is better than AES [17,18]. Two sh compared with AES, both algorithms may support key sizes of 128, 192, and 256-bit.…”
Section: Two Sh and Aes Integrationmentioning
confidence: 99%
“…The most common symmetric block cipher algorithm is AES. AES includes block sizes 128-bit, key lengths 128, 192, and 256-bit, and 10, 12, and 14 rounds to encrypt the data [17,18,21]. AES uses different length keys to encrypt and decode data, for example, a 128-bit length key used by AES-128.…”
Section: Two Sh and Aes Integrationmentioning
confidence: 99%
“…However, the overall method is the same as AES, which involves feeding a box with the first block of cipher -text and a block of 128 bits of encrypted message [22].Finally, a ciphertext is created that has the same length as the plain text, with each 128 bit encoded with AES using the same key [21].When you go a little further, you'll see that this is a mixture of their most well-known primitives, substitution, transposition, and bitwise computation.In AES, the lowest and most often used key size is 128 bits [1].…”
Section: Existingmentioning
confidence: 99%
“…The riddle, in this sense, remains a well-kept secret.Perfect counts have a propensity to prevent an excessive amount of calculating ability from being used, and they encode data quickly [1], [2].The Secure Sockets Layer (SSL) is a security protocol for web-based applications.…”
Section: Cryptographic Algorithms Work Issuesmentioning
confidence: 99%
See 1 more Smart Citation