Secure Data Encryption Through a Combination of AES, RSA and HMAC
Journal Title: Engineering, Technology & Applied Science Research - Year 2017, Vol 7, Issue 4
Abstract
Secure file transfer based upon well-designed file encryption and authorization systems expend considerable effort to protect passwords and other credentials from being stolen. Transferring and storing passwords in plaintext form leaves them at risk of exposure to attackers, eavesdroppers and spyware. In order to avoid such exposure, powerful encryption/authentication systems use various mechanisms to minimize the possibility that unencrypted credentials will be exposed, as well as be sure that any authentication data that does get transmitted and stored will be of minimal use to an attacker. In this paper we proposed a method to protect data transferring by three hybrid encryption techniques: symmetric AES algorithm used to encrypt files, asymmetric RSA used to encrypt AES password and HMAC to encrypt symmetric password and/or data to ensure a secure transmitting between server-client or client-client from verifying in-between client and server and make it hard to attack by common attacked methods.
Authors and Affiliations
E. S. I. Harba
Performance Analysis of Non-Isolated DC-DC Buck Converter Using Resonant Approach
DC-DC converters preserve or control the output DC voltage. Due to parasitic constituents such as leakage capacitance of both diode and inductor, and transformer leakage inductance, DC-DC converters mostly operate on rig...
Model and Reduction of Inactive Times in a Maintenance Workshop Following a Diagnostic Error
The majority of maintenance workshops in manufacturing factories are hierarchical. This arrangement permits quick response in advent of a breakdown. Reaction of the maintenance workshop is done by evaluating the characte...
A Global Online Handwriting Recognition Approach Based on Frequent Patterns
In this article, the handwriting signals are represented based on geometric and spatio-temporal characteristics to increase the feature vectors relevance of each object. The main goal was to extract features in the form...
A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time
Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP) applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services be...
Photoelastic Analysis of the Vertebral Fixation System Using Different Screws
The purpose of this study was to compare using photoelasticity, the internal stresses produced by two types of pedicular screws (Synthes™) with three different diameters, when submitted to different pullout strengths. Th...