2018
DOI: 10.1007/978-981-13-2673-8_30
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Data Privacy, Authentication and Integrity Schemes Using Hybrid Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…With the help of cryptography, secret data can be easily encrypted [13]. Some of the main goals of cryptography are integrity, authentication, and confidentiality [14]. Then, the steganography process hides the encrypted data so that nobody can suspect that there exists secret data [15].…”
Section: Introductionmentioning
confidence: 99%
“…With the help of cryptography, secret data can be easily encrypted [13]. Some of the main goals of cryptography are integrity, authentication, and confidentiality [14]. Then, the steganography process hides the encrypted data so that nobody can suspect that there exists secret data [15].…”
Section: Introductionmentioning
confidence: 99%
“…Security of cryptography systems depends on “algorithm power” and “key size,” [ 1 ] and the general cryptography levels are divided into three levels, including cryptography algorithms, security protocols, and applications [ 2 , 3 ]. However, the cryptography algorithms are designed and implemented to achieve goals such as confidentiality, authentication, and integrity [ 4 ], but various components such as speed, resource consumption, application type, flexibility, scalability, and reliability should be considered for their design. Design of a cryptography algorithm should be systematic, comprehensive, and staged.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, cryptography algorithms are a fundamental part of this system [2]. However, cryptography algorithms are implemented to attain the goals such as security or confidentiality, integrity, and authenticity of designing [3], but for designing them, many components should be considered, such as speed, resource consumption, usage type [4]- [6]. So, providing all of these needs in algorithm design simultaneously is a problematic matter and, in some cases, is impossible.…”
Section: Introductionmentioning
confidence: 99%