Asymmetric Key Algorithm

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 2361 Experts worldwide ranked by ideXlab platform

Nurul Hidayah Ab Rahman - One of the best experts on this subject based on the ideXlab platform.

  • email authentication using symmetric and Asymmetric Key Algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using Asymmetric and symmetric Key Algorithms. The Asymmetric Algorithm is RSA and symmetric Algorithm is Advance Encryption Standard. With the combination for both Algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and Asymmetric Key Algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and Asymmetric Key Algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Chuah Chai Wen, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using Asymmetric and symmetric Key Algorithms. The Asymmetric Algorithm is RSA and symmetric Algorithm is Advance Encryption Standard. With the combination for both Algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

Mohamad Azhar Abdul Halim - One of the best experts on this subject based on the ideXlab platform.

  • email authentication using symmetric and Asymmetric Key Algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using Asymmetric and symmetric Key Algorithms. The Asymmetric Algorithm is RSA and symmetric Algorithm is Advance Encryption Standard. With the combination for both Algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and Asymmetric Key Algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and Asymmetric Key Algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Chuah Chai Wen, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using Asymmetric and symmetric Key Algorithms. The Asymmetric Algorithm is RSA and symmetric Algorithm is Advance Encryption Standard. With the combination for both Algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

Isredza Rahmi - One of the best experts on this subject based on the ideXlab platform.

  • email authentication using symmetric and Asymmetric Key Algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using Asymmetric and symmetric Key Algorithms. The Asymmetric Algorithm is RSA and symmetric Algorithm is Advance Encryption Standard. With the combination for both Algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and Asymmetric Key Algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and Asymmetric Key Algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Chuah Chai Wen, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using Asymmetric and symmetric Key Algorithms. The Asymmetric Algorithm is RSA and symmetric Algorithm is Advance Encryption Standard. With the combination for both Algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

Nurul Azma Abdullah - One of the best experts on this subject based on the ideXlab platform.

  • email authentication using symmetric and Asymmetric Key Algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using Asymmetric and symmetric Key Algorithms. The Asymmetric Algorithm is RSA and symmetric Algorithm is Advance Encryption Standard. With the combination for both Algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and Asymmetric Key Algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and Asymmetric Key Algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Chuah Chai Wen, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using Asymmetric and symmetric Key Algorithms. The Asymmetric Algorithm is RSA and symmetric Algorithm is Advance Encryption Standard. With the combination for both Algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

Yellepeddi Vijayalakshmi - One of the best experts on this subject based on the ideXlab platform.

  • enhancement of e commerce security through Asymmetric Key Algorithm
    Computer Communications, 2020
    Co-Authors: P Dijesh, Suvanamsasidhar Babu, Yellepeddi Vijayalakshmi
    Abstract:

    Abstract Electronic commerce offers reduced transaction costs and much convenient mode of business to all over global consumers. This paper explains Asymmetric methods which uses electronic commerce transactions and other assisted Algorithms of cryptography that are important in set up of electronic commerce working. This study explains the essential security problems in electronic commerce. To avoid the issues of security certain secure conditions must be followed which offers sufficient security to transaction data for every entity in transaction of electronic commerce. In this study a multi-layer encryption Algorithm namely RSA encryption Algorithm and Fernet cipher encryption Algorithm is proposed based on security. Multi-layer encryption Algorithm is used to construct a sophisticated and complex approach of encryption. This Algorithm integrates the strength of several techniques of encryption at the same time. This study reveals how much safe consumer and payment data order will be managed effectively by security-based approaches. Encryption technique discussed in this study is the major technique to make the transaction over internet secure. A better technology of encryption can decrease the fraudlent activities easily and effectively. This study proposes a multi-layer encryption Algorithm and implemented it in order to enable delivery of messages through network in a secure way. This study will be helpful to control the decryption and encryption with the use of private and public Key of receiver and sender.