2022
DOI: 10.18280/ts.390117
|View full text |Cite
|
Sign up to set email alerts
|

Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
48
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 28 publications
(48 citation statements)
references
References 0 publications
0
48
0
Order By: Relevance
“…Information security is defined as a set of processes and practices that aim to protect and preserve information from external threats, such as destruction, theft, and sabotage. It mainly depends on the protection of all kind of information wherever it is found in a way that is largely determined by the policy of the company or the individual owning it [7].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Information security is defined as a set of processes and practices that aim to protect and preserve information from external threats, such as destruction, theft, and sabotage. It mainly depends on the protection of all kind of information wherever it is found in a way that is largely determined by the policy of the company or the individual owning it [7].…”
Section: Related Workmentioning
confidence: 99%
“…The encryption process uses an encryption key that is a set of mathematical values agreed upon by both the sender and the receiver. The recipient uses the key to decrypt the ciphertext and convert it back to readable plain text [7], [8]. The more complex the encryption key, the more secure the encryption as third parties are less likely to be able to decrypt data through brute force attacks (i.e.…”
Section: Introductionmentioning
confidence: 99%
“…In computing, unencrypted data is also known as common text, and encrypted data is called cipher text. The formulas used to encrypt and decrypt messages are called cipher algorithms or ciphers [55][56][57][58][59][60][61][62]. To be effective, encryption includes a variable as part of the algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…With RSA, the public or private key can be used to encrypt a message; Whichever is not used for encryption becomes the decryption key (see figure 1) [40][41][42][43][44][45][46][47][48][49][50]. Today, many cryptographic processes use a symmetric algorithm to encrypt data and an asymmetric algorithm for secure secret key exchange [55][56][57][58][59][60][61][62].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation