2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN) 2017
DOI: 10.1109/icrcicn.2017.8234529
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation of a two-layered hybrid cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Manna et al [6] propose a two-layer hybrid cryptosystem to avoid interception and protect the shared key. Accordingly, the authors have developed a hybrid cryptosystem that uses a private key encryption model and a public key combination model.…”
Section: Related Studymentioning
confidence: 99%
See 1 more Smart Citation
“…Manna et al [6] propose a two-layer hybrid cryptosystem to avoid interception and protect the shared key. Accordingly, the authors have developed a hybrid cryptosystem that uses a private key encryption model and a public key combination model.…”
Section: Related Studymentioning
confidence: 99%
“…The term symmetric algorithm refers that, it uses of the same key to encrypt and decrypt. Asymmetric cryptosystem the method of enciphering and deciphering procedure uses encryption and decryption of two different keys [5], [6]. A symmetric algorithm is a mutual distribution of the collective secret between two users, such as the data encryption standard (DES) algorithm, which is the most important feature of any cryptosystem.…”
Section: Introductionmentioning
confidence: 99%