rsa algorithm
Recently Published Documents


TOTAL DOCUMENTS

385
(FIVE YEARS 167)

H-INDEX

11
(FIVE YEARS 3)

2022 ◽  
Vol 10 (2) ◽  
pp. 199
Author(s):  
I Gede Bendesa Aria Harta ◽  
I Ketut Gede Suhartana ◽  
I Gusti Ngurah Anom Cahyadi ◽  
Cokorda Pramartha ◽  
I Komang Ari Mogi ◽  
...  

Lontar is a relic of cultural heritage whose basic source of manufacture is from rontal or tal leaves containing evidence of all records of aspects of ancient historical life which include historical values, religion, philosophy, medicine, literature and other sciences so that their sustainability needs to be maintained. Security of digital lontar will make it easier to preserve a lontar work so that it is not changed or falsified by irresponsible parties, where digital lontar in PDF format will be given a digital signature to maintain the authenticity of the document. Documents that are signed will be difficult for other parties to change, if the contents of a digital ejection are changed it will cause the digital signature to change. Based on the research conducted, from the results of testing the security of digital ejection with digital signatures using the RSA algorithm, the test results from RMSE (Root Mean Square Error) for description results with an average of 69.7794143. The larger or random the description results, the more complex the description results will be.


2022 ◽  
Vol 12 (1) ◽  
pp. 438
Author(s):  
Xiaosong Yu ◽  
Jiye Wang ◽  
Kaixin Zhang ◽  
Jiaqi Lv ◽  
Yongli Zhao ◽  
...  

With the development of optical networks technology, broad attention has been paid to flexible grid technology in optical networks due to its ability to carry large-capacity information as well as provide flexible and fine-grained services through on-demand spectrum resource allocation. However, a one-time green-field deployment of a flexible grid network may not be practical. The transition technology called the fixed/flex-grid optical networks is more applicable and highly pragmatic. In such network, many nodes would likely be upgraded from a fixed-grid to flex-grid. In fact, dynamic service provisioning during the process of a node upgrade in fixed/flex-grid optical networks have become a challenge because the service connection can be easily interrupted, which leads to considerable data loss because of node upgrade. To overcome this challenge, we propose a brown-field migration aware routing and spectrum assignment (BMA-RSA) algorithm in fixed/flex-grid optical networks. The aim is to construct a probabilistic migration label (PML) model. The well-designed label setting of PML can balance the relationship between distance and node-upgrade probability. Dynamic service provisioning operations are undertaken based on the PML model to achieve a migration-aware dynamic connection before network migration occurs. We also evaluate the performance of different service provisioning strategies under different traffic models. The simulation results show that the BMA-RSA algorithm can achieve: (1) the tradeoff between distance and node upgrade probability during the process of service provisioning; (2) lower service interruption compared with the traditional non-migration aware K-shortest-path routing and spectrum assignment algorithm.


Author(s):  
Zakria Mahrousa, Mahmoud Rahhal, Nairouz Alzin Zakria Mahrousa, Mahmoud Rahhal, Nairouz Alzin

The cloud healthcare system represents an important application for cloud computing, as it uses the cloud for the operations of storing patient medical data and sharing it between health care service providers and patients, making the security and privacy of e-health system data the main concern of researchers. This paper presents an integrated secure model for the healthcare system in cloud computing that achieves the security and confidentiality of data transferred through cloud computing, by combining the two algorithms AES and RSA with the access control algorithm CP-ABE in order to use the advantages of each of them, where the encryption process is done by a proposed algorithm which is based on the RSA algorithm, the XOR parameter, and the AES algorithm; the secrecy of the AES algorithm has been increased by generating a dynamic key, and the confidentiality of this key has been secured with two encryption levels, the first level using the CP-ABE algorithm and the second level using the RSA algorithm. The proposed model is characterized by meeting the requirements of access control, authentication, and verification for both the transmitter and the receiver, and the results of the application of this model proved its ability to meet the security requirements of the health care system in cloud computing with the lowest possible implementation time, as the execution times were at the transmitter's end (43.2, 43.83, 45.11, 48. 23, 50.77, 52.16, 57.95, 63.2, and 63.35)ms for variable file sizes (37, 50, 100, 150, 200, 256, 512, 1000, and 1024)KB, respectively. The results also showed its superiority in terms of security requirements in cloud computing and the necessary implementation times on studied reference models.


Author(s):  
Kamal Arora ◽  
Deepinder Kaur

The Internet of Things (IoT) has emerged as an area of incredible impact, with the arrival of savvy homes, savvy cities, and savvy everything. For current and future research areas it is one of the hot topics involved by both industry sector and academia. The Internet of Things (IoT) also known as a web of everything or the economic Internet is a new technology paradigm imagine as a worldwide network and devices competent to interacting with each other. Privacy and security are the major challenges in the Internet of Things (IoT) security due to the distributed nature of IoT networks [1]. Internet of things (IoT) is an upheaval of the internet. IoT are often said the expansion of internet services. It provides a platform for communication between gadgets where gadgets can manage and organize themselves. The IoT allows everyone to be connected anytime and anywhere.


2021 ◽  
pp. 277-283
Author(s):  
Zhenghui Chang ◽  
Pengfei Gong

Author(s):  
Eriselda Guri Malaj ◽  
Galia Ilieva Marinova
Keyword(s):  

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Fei Yao

The previous encryption methods of hospital financial data have the problem of overburden. Therefore, a research study on hybrid encryption of hospital financial data based on Noekeon algorithm is proposed. From the basic principles of the Noekeon algorithm and the application and implementation of the Noekeon algorithm, a hybrid encryption scheme for hospital financial data based on the Noekeon algorithm is designed. In order to improve the security of the encryption system, the RSA algorithm is used to encrypt the encrypted content twice. The hybrid algorithm realizes the hybrid encryption of the hospital's financial data. Finally, a hybrid encryption system for hospital financial data based on Noekeon algorithm is designed. Experimental results show that this method has a higher success rate and better comprehensive performance. It not only improves the encryption efficiency of hospital financial data but also enhances the security of hospital financial data, which has greater application value.


Sign in / Sign up

Export Citation Format

Share Document