Secure Data Encryption Through a Combination of AES, RSA and HMAC
Journal Title: Engineering, Technology & Applied Science Research - Year 2017, Vol 7, Issue 4
Abstract
Secure file transfer based upon well-designed file encryption and authorization systems expend considerable effort to protect passwords and other credentials from being stolen. Transferring and storing passwords in plaintext form leaves them at risk of exposure to attackers, eavesdroppers and spyware. In order to avoid such exposure, powerful encryption/authentication systems use various mechanisms to minimize the possibility that unencrypted credentials will be exposed, as well as be sure that any authentication data that does get transmitted and stored will be of minimal use to an attacker. In this paper we proposed a method to protect data transferring by three hybrid encryption techniques: symmetric AES algorithm used to encrypt files, asymmetric RSA used to encrypt AES password and HMAC to encrypt symmetric password and/or data to ensure a secure transmitting between server-client or client-client from verifying in-between client and server and make it hard to attack by common attacked methods.
Authors and Affiliations
E. S. I. Harba
Effect of Viscosity on the GTA Welds Bead Penetration in Relation with Surface Tension Elements
The aim of this paper is to study the effect of the viscous dissipation on the surface tension and its role on the shape of weld pool. Experiments were conducted on four different casts of ferritic stainless steel with d...
Indirect 3D-Space Vector Modulation for Matrix Converter
This paper discusses the indirect space vector modulation for four-leg matrix converter. Four-leg matrix converter has been proven to be a reliable, cost-effective, and compact power electronic interface to supply unbala...
NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce
Research in Intelligent Agents has yielded interesting results, some of which have been translated into commerÂcial ventures. Intelligent Agents are executable software components that represent the user, perform tasks o...
SLA Management For Virtual Machine Live Migration Using Machine Learning with Modified Kernel and Statistical Approach
Application of cloud computing is rising substantially due to its capability to deliver scalable computational power. System attempts to allocate a maximum number of resources in a manner that ensures that all the servic...
Numerical Investigation of the Physical Properties Effect on the Thermal Performance of a Vertical Geothermal Heat Exchanger
Low-temperature geothermal energy is a promising technique for heating and cooling residential and commercial premises, especially since it is one of the green energy solutions that respect the environment. The principle...