2020
DOI: 10.1007/978-981-15-7345-3_46
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Data Security Using Hybrid Cryptography on Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
23
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(33 citation statements)
references
References 9 publications
0
23
0
Order By: Relevance
“…A decryption process enables organizations to view the system that can benefit security professionals as it evades encryption usage to obscure sensitive information during iteration. 31 The decryption algorithm has various types: Triple-DES, Twofish, Blowfish, RSA, and AES. Triple-DES algorithm used by hackers for gradually learning to beat at greater eases.…”
Section: Decryption Algorithmsmentioning
confidence: 99%
“…A decryption process enables organizations to view the system that can benefit security professionals as it evades encryption usage to obscure sensitive information during iteration. 31 The decryption algorithm has various types: Triple-DES, Twofish, Blowfish, RSA, and AES. Triple-DES algorithm used by hackers for gradually learning to beat at greater eases.…”
Section: Decryption Algorithmsmentioning
confidence: 99%
“…10-Until the text is produced, they will be converted from long to bytes and then added to the Result array and the ciphertext is produced 11-The end. Figure (1) shows the encryption process.…”
Section: Text Encryption Algorithm 1-mentioning
confidence: 99%
“…To put it another way, cryptography is the art and science of maintaining security by encoding messages in an unreadable form (unintelligible). The origins of the word come from the Greek terms "crypto" and "graphy" which mean "hidden" and "writing," respectively [1] [2].…”
Section: Introductionmentioning
confidence: 99%
“…Comparison between AES and DES using different parameters discussed in the form of table. Chinnasamy et al [15] explained the weakness of traditional symmetric and asymmetric algorithm and proposed a new algorithm that is the combination of ECC and Blowfish, which provides the high security and confidentiality to the data. Tallapally and Manjula [16] proposed a multilevel security scheme that provide more security as compare to single level security in encryption.…”
Section: Related Workmentioning
confidence: 99%
“…Decoding is the way toward changing over scrambled or encoded information or text back to its unique plain organization that individual's PC applications can undoubtedly peruse and fathom [15]. This is something contrary to encryption which includes coding information to make it confused by everybody except just by those with coordinating decoding keys.…”
mentioning
confidence: 99%