2016
DOI: 10.1007/978-81-322-2755-7_9
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Hybrid Encryption Technique Based on DES and RSA for Textual Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Names, addresses of residence, birthdates, marital statusall these data should be kept in a secured way. However, to protect a printed document from unauthorized access is much harder than to ensure information security in a computer system where a document security management system can be used and both cryptography and steganography can be applied [12,13].…”
Section: B Textual Data Protectionmentioning
confidence: 99%
“…Names, addresses of residence, birthdates, marital statusall these data should be kept in a secured way. However, to protect a printed document from unauthorized access is much harder than to ensure information security in a computer system where a document security management system can be used and both cryptography and steganography can be applied [12,13].…”
Section: B Textual Data Protectionmentioning
confidence: 99%
“…A hybrid encryption technique that uses permutation of text and image based on hyperchaotic scheme is proposed in [8]. Smita et al, in [9] has described a hybrid encryption technique that makes use of DES and RSA for text data. Pia Singh, in [10] has given a method to encrypt and decrypt image using blowfish.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, the DES algorithm is used to encrypt the raw data. Another layer of encryption is added on the DES key using the RSA algorithm [4]. This solves the problem of DES symmetric key secure sharing.…”
Section: Introductionmentioning
confidence: 99%
“…The approach included 3 phases to be applied on the data, namely, DES, RSA, Hybrid algorithm. The keys that were used in the last step were string, modulus, private, public and integer key [8].…”
Section: Introductionmentioning
confidence: 99%