{"title":"基于新型混合密码系统的数据安全优化","authors":"Aman, R. Aggarwal","doi":"10.1109/ViTECoN58111.2023.10157646","DOIUrl":null,"url":null,"abstract":"Every communication system's main issue is data security. For any business, educational institution, or defense force, communication has become a crucial instrument. Data transfer must be done safely and securely. Many cryptographic methods have been suggested and put into use as of late. Based on the quantity of keys employed, those algorithms are divided into asymmetric and symmetric algorithms. Although numerous algorithms are employed to protect data, they occasionally breach its security. At now, the goal is to combine a number of safe methods to create a highly secure data transmission environment. The RSA asymmetric method, the SHA256 hashing technique, and the symmetric cryptographic algorithms AES and Twofish will all be merged. These methods enable us to guarantee the secrecy, authentication, and data integrity of three cryptography fundamentals. For text encryption, a number of security analysts are utilized, including differential analysis, histogram, information entropy, secret key size and key sensitivity. The suggested technique offers a high degree of security, a rise in key size, and a better encryption scheme according to the findings of numerical simulation for text encryption.","PeriodicalId":407488,"journal":{"name":"2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data Security Optimization Using New Hybrid Cryptographic System\",\"authors\":\"Aman, R. Aggarwal\",\"doi\":\"10.1109/ViTECoN58111.2023.10157646\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Every communication system's main issue is data security. For any business, educational institution, or defense force, communication has become a crucial instrument. Data transfer must be done safely and securely. Many cryptographic methods have been suggested and put into use as of late. Based on the quantity of keys employed, those algorithms are divided into asymmetric and symmetric algorithms. Although numerous algorithms are employed to protect data, they occasionally breach its security. At now, the goal is to combine a number of safe methods to create a highly secure data transmission environment. The RSA asymmetric method, the SHA256 hashing technique, and the symmetric cryptographic algorithms AES and Twofish will all be merged. These methods enable us to guarantee the secrecy, authentication, and data integrity of three cryptography fundamentals. For text encryption, a number of security analysts are utilized, including differential analysis, histogram, information entropy, secret key size and key sensitivity. The suggested technique offers a high degree of security, a rise in key size, and a better encryption scheme according to the findings of numerical simulation for text encryption.\",\"PeriodicalId\":407488,\"journal\":{\"name\":\"2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN)\",\"volume\":\"130 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ViTECoN58111.2023.10157646\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ViTECoN58111.2023.10157646","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data Security Optimization Using New Hybrid Cryptographic System
Every communication system's main issue is data security. For any business, educational institution, or defense force, communication has become a crucial instrument. Data transfer must be done safely and securely. Many cryptographic methods have been suggested and put into use as of late. Based on the quantity of keys employed, those algorithms are divided into asymmetric and symmetric algorithms. Although numerous algorithms are employed to protect data, they occasionally breach its security. At now, the goal is to combine a number of safe methods to create a highly secure data transmission environment. The RSA asymmetric method, the SHA256 hashing technique, and the symmetric cryptographic algorithms AES and Twofish will all be merged. These methods enable us to guarantee the secrecy, authentication, and data integrity of three cryptography fundamentals. For text encryption, a number of security analysts are utilized, including differential analysis, histogram, information entropy, secret key size and key sensitivity. The suggested technique offers a high degree of security, a rise in key size, and a better encryption scheme according to the findings of numerical simulation for text encryption.