IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • Balkan Journal of Electrical and Computer Engineering
  • Volume:7 Issue:4
  • Three Part Hybrid Encryption Schema

Three Part Hybrid Encryption Schema

Authors : Hakan GENÇOĞLU, Tarık YERLİKAYA
Pages : 384-390
Doi:10.17694/bajece.616893
View : 19 | Download : 8
Publication Date : 2019-10-30
Article Type : Research Paper
Abstract :Hybrid encryption schemes are consist of two parts. First part for encryting the text with symmetric algorithm called DEM insert ignore into journalissuearticles values(Data Encryption Mechanism); and the second one is for encrypting the symmetric algorithm key with asymmetric algorithm called KEM insert ignore into journalissuearticles values(Key Encryption Mechanism);. If we think to expand the KEM packet with e-sign, message digest and extra security data for validation and authentication, how will be the encryption of KEM packet and also the performance KEM mechanism. Our study try to answer that question and also offer a new hybrid encryption mechanism for information security.
Keywords : Cryptography, hybrid cryptography, data security

ORIGINAL ARTICLE URL
VIEW PAPER (PDF)

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2025