High Security by using Triple Wrapping Feature and their Comparison

α
Pooja Lal Mundaniya
Pooja Lal Mundaniya
σ
Naveen Choudhary
Naveen Choudhary
α Maharana Pratap University of Agriculture and Technology Maharana Pratap University of Agriculture and Technology

Send Message

To: Author

High Security by using Triple Wrapping Feature and their Comparison

Article Fingerprint

ReserarchID

CSTIT2FOX9

High Security by using Triple Wrapping Feature and their Comparison Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

In the age of information, cryptography is a predominant obligation for the security of our documents. Cryptography inclusive of authentication, integrity, confidentiality and non-repudiation has lot to offer. To protect users’ information and their data from being attacked, encryption and digital signature algorithms could be utilized with distinct approaches to administer secure network and security solutions. In the current scenario, encryption alone cannot withstand the novel attacks; for notable security, we require encryption with digital signature. In this paper symmetric, asymmetric algorithm and digital signature techniques are proposed to elevate security. ElGamal encryption algorithm, ElGamal digital signature algorithm and IDEA algorithms are employed in the proposed methodology.

References

15 Cites in Article
  1. M Khan,Y Singh (2005). On the security of Joint Signature and Hybrid Encryption.
  2. W Diffie,M Hellman (1976). New Directions in Cryptography.
  3. W Xing-Hui,M Xiu-Jun (2010). Research of the Database Encryption Technique Based on Hybrid Cryptography.
  4. R Rivest,A Shamir,L Adleman (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.
  5. Zuhua Shao (2004). Efficient deniable authentication protocol based on generalized ElGamal signature scheme.
  6. K Reddy,G Raju (2013). A New Design of Algorithm for Enhancing Security in Bluetooth Communication with Triple DES.
  7. M Malhotra,A Singh (2013). Study of Various Cryptographic Algorithms.
  8. M Jain,A (2014). QIT Press - International Journal of Construction Engineering and Management.
  9. S Jain,A Abhale,A Jadhav (2012). Improved Security with Signcryption.
  10. Z Jun,Z Ying,J Don (2010). ElGamal Digital Signature Scheme With a Private Key Pairs.
  11. Yuliang Zheng (1996). Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) + cost(encryption).
  12. D Gonzalez,W Kinsner (2013). Comparison Of Cryptosystems Using A Single-Scale Statistical Measure.
  13. P Mohit,G Biswas Design of ElGamal PKC for Encryption of Large Messages.
  14. S Subasree,N Sakthivel (2010). Design Of A New Security Protocol Using Hybrid Cryptography Algorithms.
  15. William Stallings (2011). Cryptography And Network Security.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Pooja Lal Mundaniya. 2015. \u201cHigh Security by using Triple Wrapping Feature and their Comparison\u201d. Global Journal of Computer Science and Technology - H: Information & Technology GJCST-H Volume 15 (GJCST Volume 15 Issue H2): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-H Classification: D.4.6
Version of record

v1.2

Issue date

July 27, 2015

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 8036
Total Downloads: 2029
2026 Trends
Related Research

Published Article

In the age of information, cryptography is a predominant obligation for the security of our documents. Cryptography inclusive of authentication, integrity, confidentiality and non-repudiation has lot to offer. To protect users’ information and their data from being attacked, encryption and digital signature algorithms could be utilized with distinct approaches to administer secure network and security solutions. In the current scenario, encryption alone cannot withstand the novel attacks; for notable security, we require encryption with digital signature. In this paper symmetric, asymmetric algorithm and digital signature techniques are proposed to elevate security. ElGamal encryption algorithm, ElGamal digital signature algorithm and IDEA algorithms are employed in the proposed methodology.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

High Security by using Triple Wrapping Feature and their Comparison

Pooja Lal Mundaniya
Pooja Lal Mundaniya Maharana Pratap University of Agriculture and Technology
Naveen Choudhary
Naveen Choudhary

Research Journals