2020
DOI: 10.18421/tem93-57
|View full text |Cite
|
Sign up to set email alerts
|

Maintaining the Integrity of Encrypted Data by Using the Improving Hash Function Based on GF 28

Abstract: The issue of protecting the information from penetration has become an important issue. The system that depends on the encryption ensures the confidentiality of the information non-disclosure of sensitive information but does not ensure the integrity of data from destruction and change. In this paper, a proposed system is designed to protect the confidentiality and integrity of data from penetration, disclosure, and destruction. The proposed system based on the polynomial numbers of GF (๐Ÿ๐Ÿ–) is achieved by im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 4 publications
0
0
0
Order By: Relevance
“…Data must be anonymized to enhance privacy. Anonymization indicates a privacy reservation technique to make the data valueless to unauthorized access (Sahab et al, 2020). Employing powerful encryption techniques, both at rest and in transit, shields data from unauthorized access and potential breaches.…”
Section: Cloud Security Fundamentalsmentioning
confidence: 99%
“…Data must be anonymized to enhance privacy. Anonymization indicates a privacy reservation technique to make the data valueless to unauthorized access (Sahab et al, 2020). Employing powerful encryption techniques, both at rest and in transit, shields data from unauthorized access and potential breaches.…”
Section: Cloud Security Fundamentalsmentioning
confidence: 99%