Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions

نویسندگان

چکیده

With the explosion of connected devices linked to one another, amount transmitted data grows day by day, posing new problems in terms information security, such as unauthorized access users’ credentials and sensitive information. Therefore, this study employed RSA ElGamal cryptographic algorithms with application SHA-256 for digital signature formulation enhance security validate sharing Security is increasingly becoming a complex task achieve. The goal be able authenticate shared function algorithms. methodology involved use C# programming language implementation using hash signature. experimental result shows that algorithm performs better than during encryption verification processes, while decryption generation process.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably Secure Cryptographic Hash Functions

The work on this thesis was part of a Study Abroad year at the University of New South Wales, Sydney. It has been a very valuable academic and personal experience, and thanks go to the many people who have supported and inspired me throughout this year. For the support with the work on this thesis, the greatest thanks go to my supervisors Jim Franklin and Richard Buckland. To Jim, for his never...

متن کامل

Dynamic Cryptographic Hash Functions

Speirs II, William Robert Ph.D., Purdue University, May, 2007. Dynamic Cryptographic Hash Functions. Major Professor: Samuel S. Wagstaff, Jr. This dissertation introduces a new type of cryptographic hash function, the dynamic cryptographic hash function. Dynamic cryptographic hash functions differ from traditional hash functions because they require a second parameter, the security parameter. T...

متن کامل

Cryptographic hash functions

Hash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks. This paper sketches the history of the concept, discusses the applications of hash functions, and presents the approaches that have be...

متن کامل

Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata

Cryptographic hash functions have recently brought an exceptional research interest. With the increasing number of attacks against the widely used functions as MD5, SHA-1 and RIPEMD, the need to consider new hash functions design and conception strategies becomes crucial. In this paper, we propose a fast and efficient hash function using programmable cellular automata that are very suitable for...

متن کامل

Design of Secure Electronic Voting System Using Multifactor Authentication and Cryptographic Hash Functions

The primary goal of every voting system is to ensure that electorate vote counts therefore, electronic democratic governance that provides a transparent and trusted election is needed. The traditional method of voting involves the use of physical paper ballot to casts vote. This is susceptible to time wasting procedures, ballot snatching, lacks voter privacy and question the integrity of fair e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information

سال: 2022

ISSN: ['2078-2489']

DOI: https://doi.org/10.3390/info13100442