Algorithmization and programing of certain encrytpion methods of economic data

Session

Computer Science and Communication Engineering

Description

Protecting data is a serious challenge since attacks can be internal and external; another challenge is the constant change of technology where with its change we can see the failures of every algorithm or certificate that is use in providing a safe channel of communication and the encryption of data. Demand for more efficient and reliable encryptions is always increasing and we can say that cryptography is vital in fulfilling those demands. In the modern field, we have many algorithms for encryption and decryption such as AES, DES, and RSA among others; many of the usually suggested algorithms possess certain flaws such as failed integrity and inadequate performance when searching for data. This paper focuses on encrypting information from the base of data, by proposing distinct algorithms for generating keys to be use in encryption and decryption. By implementing and applying the proposed methods, we improve the security, performance and reliability in the usage of data.

Keywords:

Encryption, Decryption, Asymmetric, Symmetric, RSA, AES, DES, Certificate, Cryptography, Cryptosystems

Session Chair

Bertan Karahoda

Session Co-Chair

Krenare Pireva

Proceedings Editor

Edmond Hajrizi

ISBN

978-9951-437-69-1

Location

Pristina, Kosovo

Start Date

27-10-2018 10:45 AM

End Date

27-10-2018 12:15 PM

DOI

10.33107/ubt-ic.2018.80

This document is currently not available here.

Share

COinS
 
Oct 27th, 10:45 AM Oct 27th, 12:15 PM

Algorithmization and programing of certain encrytpion methods of economic data

Pristina, Kosovo

Protecting data is a serious challenge since attacks can be internal and external; another challenge is the constant change of technology where with its change we can see the failures of every algorithm or certificate that is use in providing a safe channel of communication and the encryption of data. Demand for more efficient and reliable encryptions is always increasing and we can say that cryptography is vital in fulfilling those demands. In the modern field, we have many algorithms for encryption and decryption such as AES, DES, and RSA among others; many of the usually suggested algorithms possess certain flaws such as failed integrity and inadequate performance when searching for data. This paper focuses on encrypting information from the base of data, by proposing distinct algorithms for generating keys to be use in encryption and decryption. By implementing and applying the proposed methods, we improve the security, performance and reliability in the usage of data.