Three Part Hybrid Encryption Schema

dc.contributor.authorGençoğlu, H.
dc.contributor.authorYerlikaya, T.
dc.date.accessioned2024-06-12T10:04:09Z
dc.date.available2024-06-12T10:04:09Z
dc.date.issued2019
dc.departmentTrakya Üniversitesien_US
dc.description.abstractHybrid encryption schemes are consist of two parts. First part for encryting the text with symmetric algorithm called DEM (Data Encryption Mechanism) and the second one is for encrypting the symmetric algorithm key with asymmetric algorithm called KEM (Key Encryption Mechanism). If we think to expand the KEM packet with e-sign, message digest and extra security data for validation and authentication, how will be the encryption of KEM packet and also the performance KEM mechanism. Our study try to answer that question and also offer a new hybrid encryption mechanism for information security.en_US
dc.identifier.doi10.17694/bajece.616893
dc.identifier.endpage390en_US
dc.identifier.issn2147-284X
dc.identifier.issue4en_US
dc.identifier.startpage384en_US
dc.identifier.trdizinid318459en_US]
dc.identifier.urihttps://doi.org/10.17694/bajece.616893
dc.identifier.urihttps://search.trdizin.gov.tr/yayin/detay/318459
dc.identifier.urihttps://hdl.handle.net/20.500.14551/12657
dc.identifier.volume7en_US
dc.indekslendigikaynakTR-Dizinen_US
dc.language.isoenen_US
dc.relation.ispartofBalkan Journal of Electrical and Computer Engineeringen_US
dc.relation.publicationcategoryMakale - Ulusal Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.titleThree Part Hybrid Encryption Schemaen_US
dc.typeArticleen_US

Dosyalar