Author:
Rahim Robbi,Zahri Nik Adilah Hanin,Warip Mohd Nazri Bin Mohd
Abstract
Abstract
Data and information protection is usually done by encrypting sensitive data and information using cipher keys or symmetric algorithms. This includes using what is known as “cipher keys,” which are used in systems that require two parts, a sender’s and receiver’s part, which is a special system that needs to be assembled, and a location where data is sent to or stored. The Three-Pass Protocol and Pohlig Hellman Algorithm solves a key distribution problem in symmetric and asymmetric cryptography, allowing senders and receivers to process encryption and decryption due to lack of key distribution processes.
Reference15 articles.
1. Image encryption for secure Internet multimedia applications;Dang;IEEE Trans. Consum. Electron.,2000
2. Privacy and security on the Internet: how to secure your personal information and company data;Attaran;Inf. Manag. Comput. Secur.,1999
3. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition;Schneier,1996
4. Online/Offline Blind Signature;Hua;Procedia Eng.,2012
5. From information security to cyber security;Solms;Comput. Secur.,2013
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献