Information security is one of the ultimate generous apprehension in each turf of today's period. In order to shelter the data broadcast over the ambiguous passage, formerly abundant cryptographic procedures are accomplished. But several limits present in the currently asymmetric and symmetric encryption procedures. The key transaction is a prime delinquent of symmetric cryptographic techniques through quicker in ciphering. To achieve the embryonic security services like authentication, integrity, and confidentiality in ...
Read More
Information security is one of the ultimate generous apprehension in each turf of today's period. In order to shelter the data broadcast over the ambiguous passage, formerly abundant cryptographic procedures are accomplished. But several limits present in the currently asymmetric and symmetric encryption procedures. The key transaction is a prime delinquent of symmetric cryptographic techniques through quicker in ciphering. To achieve the embryonic security services like authentication, integrity, and confidentiality in this hybrid model message digest, encryption methods and digital signature respectively are used and a digital envelope is also incorporated which involves all of this to transfer them confidently over the connection. We are proposed that type hybrid algorithm that can take less time in compares to other present algorithms. We are also providing more security as compared to other techniques.
Read Less
Add this copy of Hybrid Cryptography Model Based on Authentication, to cart. $71.13, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2019 by LAP LAMBERT Academic Publishin.