Secure Data Encryption Through a Combination of AES, RSA and HMAC
Journal Title: Engineering, Technology & Applied Science Research - Year 2017, Vol 7, Issue 4
Abstract
Secure file transfer based upon well-designed file encryption and authorization systems expend considerable effort to protect passwords and other credentials from being stolen. Transferring and storing passwords in plaintext form leaves them at risk of exposure to attackers, eavesdroppers and spyware. In order to avoid such exposure, powerful encryption/authentication systems use various mechanisms to minimize the possibility that unencrypted credentials will be exposed, as well as be sure that any authentication data that does get transmitted and stored will be of minimal use to an attacker. In this paper we proposed a method to protect data transferring by three hybrid encryption techniques: symmetric AES algorithm used to encrypt files, asymmetric RSA used to encrypt AES password and HMAC to encrypt symmetric password and/or data to ensure a secure transmitting between server-client or client-client from verifying in-between client and server and make it hard to attack by common attacked methods.
Authors and Affiliations
E. S. I. Harba
Effects of Climate Change on Mountain Waters: A Case Study of European Alps
The Alps play a vital role in the water supply of the region through the rivers Danube, Rhine, Po and Rhone while they are crucial to the ecosystem. Over the past two centuries, we witnessed the temperature to increase b...
A Comparison Among Different Parameters for the Design of a Photovoltaic/Thermal System Using Computational Fluid Dynamics
The purpose of this paper is to compare several fins, duct height, and velocity magnitudes to acquire a PhotoVoltaic/Thermal system designed through Computational Fluid Dynamics. Simulation of different fins (rectangular...
A Decision-Analytic Feasibility Study of Upgrading Machinery at a Tools Workshop
This paper presents the evaluation, from a Decision Analysis point of view, of the feasibility of upgrading machinery at an existing metal-forming workshop. The Integral Decision Analysis (IDA) methodology is applied to...
On Some Unsolved Problems of Mathematica
In this paper, some unsolved problems of the Mathematica software package are documented. At first, it is shown, using a number of examples, that the processing (simplification) of rational-fractional expressions involvi...
Modeling and Analysis of a Cascaded Battery-Boost Multilevel Inverter Using Different Switching Angle Arrangement Techniques
Multilevel inverters have the capability to produce an AC staircase output waveform without using a bulky passive filter. Therefore, the multilevel inverters are gaining more and more popularity, among the different type...