2019
DOI: 10.11591/ijece.v9i4.pp2578-2584
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm

Abstract: <p id="docs-internal-guid-6a0c8b63-7fff-9eae-d67f-17fb2c33e518" dir="ltr"><span>Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 5 publications
(4 reference statements)
0
3
0
Order By: Relevance
“…RSA algorithm has a working concept that is factoring two large integers so that it becomes a problem that is difficult and challenging, but the encryption strength lies in the key length, if we add the length or size of the key is the encryption level will also increase gradually [30]. The main use of the RSA algorithm because it is the most secure key exchange mechanism [31], the appropriate domain for the implementation of this algorithm is to secure digital key transport signatures [32].…”
Section: Application Of Asymmetric Keys Using the Rsa Algorithmmentioning
confidence: 99%
“…RSA algorithm has a working concept that is factoring two large integers so that it becomes a problem that is difficult and challenging, but the encryption strength lies in the key length, if we add the length or size of the key is the encryption level will also increase gradually [30]. The main use of the RSA algorithm because it is the most secure key exchange mechanism [31], the appropriate domain for the implementation of this algorithm is to secure digital key transport signatures [32].…”
Section: Application Of Asymmetric Keys Using the Rsa Algorithmmentioning
confidence: 99%
“…Obviously, in most cases, the necessity of designing an algorithm is to achieve several goals simultaneously. For example, the purpose of designing an algorithm could be to achieve high speed, adequate security, and high flexibility using various techniques such as Self-stabilizing techniques [28], [29], CNN method [30], [31], image and signal processing [32]- [34], hybrid methods [15] and so on, at the same time.…”
Section: Extraction Of Components 31 the Purposes Of Designing Cryptographic Algorithmsmentioning
confidence: 99%
“…In [11] the general tendency towards cryptography in various sectors of the industry has been studied in a 13-year period (2005)(2006)(2007)(2008)(2009)(2010)(2011)(2012)(2013)(2014)(2015)(2016)(2017)(2018), which shows that in 2005, 15% of organizations and in 2017, 43% of them have a cryptographic strategy. It can be said that today, the most significant features of cryptography are system function and delay time, policy implementation and support for cloud deployment and IoT cryptography [12]- [15]. As can be seen, the new necessities in this domain, such as quantum cryptography [16] and smart grid [17], require these needs to be considered in the design of cryptographic algorithms.…”
Section: Introductionmentioning
confidence: 99%