2021
DOI: 10.1007/978-981-16-5301-8_23
|View full text |Cite
|
Sign up to set email alerts
|

Three-Level Hybrid Data Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…The literature [14][15][16][17][18][19][20][21][22][23][24][25][26] presents various methods for enhancing and changing security algorithms to estimate greater security in the shortest time. In [14], a model integrating the Diffie-Hellman (DH) key exchange with the asymmetric Key RSA cryptography scheme is designed to prevent the MITM attack.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The literature [14][15][16][17][18][19][20][21][22][23][24][25][26] presents various methods for enhancing and changing security algorithms to estimate greater security in the shortest time. In [14], a model integrating the Diffie-Hellman (DH) key exchange with the asymmetric Key RSA cryptography scheme is designed to prevent the MITM attack.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As more vulnerable algorithms are created, data security may be compromised. Three kinds of data security are proposed to be provided by a hybrid method [17]. The first layer of protection is created when the ciphertext is created.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Many techniques for improving and altering security algorithms to estimate better security in the shortest time have been given in the literature [11][12][13][14][15][16][17][18][19][20][21][22][23]. In [11], a model combining the public Key RSA cryptography system with the Di e-Hellman (DH) key exchange is created to prevent the man-in-themiddle (MITM) attack.…”
Section: Related Workmentioning
confidence: 99%
“…The development of weaker algorithms may endanger data security. In [14],a hybrid technique is suggested t provide three data security levels. Producing the ciphertext provides the rst level of security.…”
Section: Related Workmentioning
confidence: 99%