Skip Nav Destination
ASME Press Select Proceedings
International Conference on Advanced Computer Theory and Engineering (ICACTE 2009)
By
ISBN:
9780791802977
No. of Pages:
2012
Publisher:
ASME Press
Publication date:
2009
eBook Chapter
115 Hybrid Cryptographic Scheme for Data Communication
By
Naziha M. Al-Aidroos
,
Naziha M. Al-Aidroos
Faculty of Science
Assiut University
, Egypt
Search for other works by this author on:
Mohamed A. Bamatraf
Mohamed A. Bamatraf
Search for other works by this author on:
Page Count:
9
-
Published:2009
Citation
Al-Aidroos, NM, Mohamed, MH, & Bamatraf, MA. "Hybrid Cryptographic Scheme for Data Communication." International Conference on Advanced Computer Theory and Engineering (ICACTE 2009). Ed. Yi, X. ASME Press, 2009.
Download citation file:
In this paper, a new cryptosystem based on hybrid approaches is proposed. This scheme provides multi-security services. The proposed scheme takes the advantage of neural networks computation power to build an encryption algorithm to serve data confidentiality, where the encrypting process is done by used shard key as input to the ANN model, and the data need to be secured will be the output of it, the generated set of weights will act as the cipher. Also, made combination between MAC technique and RSA encryption algorithm produced digital signature of the scheme which provided the integrity and authentication services. The...
Abstract
Key Words
1. Introduction
2. Background
3. The Proposed Scheme
4. Experimental Results
5. Security Analysis
6. Conclusions
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
SENMAN: A Secure Encoder for MANET
International Conference on Computer Engineering and Technology, 3rd (ICCET 2011)
Detecting the Watermarked Image in Visual CAPTCHA Format and Getting Its Encrypted Information
International Conference on Mechanical Engineering and Technology (ICMET-London 2011)
Link Prediction in Social Network by SNA and Supervised Learning
International Conference on Mechanical Engineering and Technology (ICMET-London 2011)
Autonomous System Traceback for Denial of Service Mitigation
International Conference on Advanced Computer Theory and Engineering, 4th (ICACTE 2011)
Related Articles
A Blockchain-Based G-Code Protection Approach for Cyber-Physical Security in Additive Manufacturing
J. Comput. Inf. Sci. Eng (August,2021)
Secure Codesign: Achieving Optimality Without Revealing
J. Comput. Inf. Sci. Eng (June,2018)
Home Telemedicine: Encryption is Not Enough
J. Med. Devices (June,2009)