High Security by using Triple Wrapping Feature and their Comparison

Authors

  • Pooja Lal Mundaniya

  • Naveen Choudhary

Keywords:

digital signature, elgamal algorithm, encrypt-sign, encrypt-sign-encrypt, idea algorithm, sign-encrypt, sign-encrypt-sign

Abstract

In the age of information, cryptography is a predominant obligation for the security of our documents. Cryptography inclusive of authentication, integrity, confidentiality and non-repudiation has lot to offer. To protect users2019; information and their data from being attacked, encryption and digital signature algorithms could be utilized with distinct approaches to administer secure network and security solutions. In the current scenario, encryption alone cannot withstand the novel attacks; for notable security, we require encryption with digital signature. In this paper symmetric, asymmetric algorithm and digital signature techniques are proposed to elevate security. ElGamal encryption algorithm, ElGamal digital signature algorithm and IDEA algorithms are employed in the proposed methodology.

How to Cite

High Security by using Triple Wrapping Feature and their Comparison. (2015). Global Journal of Computer Science and Technology, 15(H2), 9-15. https://testing.computerresearch.org/index.php/computer/article/view/100954

References

High Security by using Triple Wrapping Feature and their Comparison

Published

2015-01-15

How to Cite

High Security by using Triple Wrapping Feature and their Comparison. (2015). Global Journal of Computer Science and Technology, 15(H2), 9-15. https://testing.computerresearch.org/index.php/computer/article/view/100954