2020
DOI: 10.5120/ijca2020920017
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Asymmetric Cryptosystem using Multiple Key System

Abstract: An increase in network technology development has its own downside; thus as more connections are established with various global computer networks daily, the more exposed the connected systems are to unauthorized access, thus making security of data very important to address. Internet based transaction applications such as internet banking, online shopping, etc., involves sharing of very sensitive information between two or more parties that should be confidential. This requires very secure end-to-end connecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…The difference profile during both process (encryption and decryption) of these two algorithms is strongly influenced by the size of public and private keys, where the data length being processed is important here [25], [26]. It can be seen that during encryption, LUC executed data faster than ElGamal because smaller number of data was processed.…”
Section: Performance Of Elgamal and Luc Algorithmsmentioning
confidence: 99%
“…The difference profile during both process (encryption and decryption) of these two algorithms is strongly influenced by the size of public and private keys, where the data length being processed is important here [25], [26]. It can be seen that during encryption, LUC executed data faster than ElGamal because smaller number of data was processed.…”
Section: Performance Of Elgamal and Luc Algorithmsmentioning
confidence: 99%