[HTML][HTML] Secure sensitive data sharing using RSA and ElGamal cryptographic algorithms with hash functions

EA Adeniyi, PB Falola, MS Maashi, M Aljebreen… - Information, 2022 - mdpi.com
With the explosion of connected devices linked to one another, the amount of transmitted
data grows day by day, posing new problems in terms of information security, such as
unauthorized access to users' credentials and sensitive information. Therefore, this study
employed RSA and ElGamal cryptographic algorithms with the application of SHA-256 for
digital signature formulation to enhance security and validate the sharing of sensitive
information. Security is increasingly becoming a complex task to achieve. The goal of this …

[PDF][PDF] Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions. Information 2022, 13, 442

E Adeniyi, PB Falola, MS Maashi, M Aljebreen… - 2022 - researchgate.net
With the explosion of connected devices linked to one another, the amount of transmitted
data grows day by day, posing new problems in terms of information security, such as
unauthorized access to users' credentials and sensitive information. Therefore, this study
employed RSA and El-Gamal cryptographic algorithms with the application of SHA-256 for
digital signature formulation to enhance security and validate the sharing of sensitive
information. Security is increasingly becoming a complex task to achieve. The goal of this …
以上显示的是最相近的搜索结果。 查看全部搜索结果