Hybrid Encryption in Correlated Randomness Model

Author(s):  
Reihaneh Safavi-Naini ◽  
Setareh Sharifian
Keyword(s):  
Author(s):  
Yunfeng Wang ◽  
Xing Zheng ◽  
Jing wang ◽  
Donghui Guo

2018 ◽  
Vol 74 (5) ◽  
Author(s):  
BASSEY ISONG ◽  
Koketso Ntshabele ◽  
Thusoyaone Moemi ◽  
Nosipho Dladlu ◽  
Naison Gasela

Author(s):  
Priya Mathur ◽  
Amit Kumar Gupta ◽  
Prateek Vashishtha

Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. Cryptography is the technique which is use to convert the plain text into cipher text using various encryption techniques. The art and science used to introduce the secrecy in the information security in order to secure the messages is defined as cryptography. In this paper we are going to review few latest Cryptographic algorithms which are used to enhance the security of the data on the cloud servers. We are comparing Short Range Natural Number Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique to secure the data in cloud.


Author(s):  
Keith M. Martin

In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal. For each of these public-key cryptosystems, we discuss how to set up key pairs and perform basic encryption and decryption. We also identify the basis for security for each of these cryptosystems. We then compare RSA, ElGamal, and elliptic-curve variants of ElGamal from the perspectives of performance and security. Finally, we look at how public-key encryption is used in practice, focusing on the popular use of hybrid encryption.


2021 ◽  
Vol 10 (02) ◽  
pp. 225-231
Author(s):  
V.Selva Bhuvaneshwari ◽  
D.Angeline Rangithamani ◽  
K.Aathi Vignesh

E-voting system based on and improved from our previous work .E-voting system, referred to as Enhanced note is enhanced with a new protocol design and watchdog hardware device to ensure voter confidentiality and voting accuracy. The watchdog device records all voting transactions to prevent voter frauds.The RSA cryptography algorithm ensures that votes casted are secured, thus maintaining the privacy of votes.The system is such that when the votes are cast on the nodes, the RSA technique encrypts the vote that is sent to the server system using both node and vote identity number.


2018 ◽  
Vol 7 (3.4) ◽  
pp. 34
Author(s):  
Leela K ◽  
Smitha Vinod

Security is a major concern when it comes to electronic data transfer. Digital signature uses hash function and asymmetric algorithms to uniquely identify the sender of the data and it also ensures integrity of the data transferred. Hybrid encryption uses both symmetric and asymmetric cryptography to enhance the security of the data. Digital Signature is used to identify the owner of the document but it does not hide the information while transferring the document. Anyone can read the message. To avoid this, data sent along with the signature should be secured. In this paper, Digital signature is combined with hybrid encryption to enhance the security level. Security of the data or the document sent is achieved by using hybrid encryption technique along with digital signature. 


Sign in / Sign up

Export Citation Format

Share Document