Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 2
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to manage security issues properly. Cryptography is an approach which makes possible for a recipient to encrypt and decrypt the information. A combination of two different strategies for encryption and decryption in the text encoding will be transformed into the used all content. The encryption and decryption key of the content decryption key is used. There are different types of information. A number, such as finding two large prime numbers with that product. The number, the size of the RSA key is large enough to make, it's hard to pinpoint these numbers. The key, known as the RSA public key, is the most prominent open encryption. Calculations were used for information exchange. In this paper, we created a program for simulation and testing of apply cryptography of Advance Encryption Standard (AES) algorithm with Rivest-Shamir-Adleman (RSA) algorithm for better performance. In this study, this program is an application of a new algorithm to be the AES&RSA principle of using a public key instead of a private key for cryptography, and the testing of encryption and decryption for the AES&RSA algorithm resulted in time is no different on the AES algorithm and more secure encryption and decryption. The results indicated that the time needed for encoding and decoding of AES&RSA algorithm has been reduced (i.e., efficiency has been improved).
Go to article

Authors and Affiliations

Santi Pattanavichai
1

  1. Rajamangala University of Technology Thanyaburi, Information Technology Department, Thailand
Download PDF Download RIS Download Bibtex

Abstract

Under the pressure of sanitary restrictions, the potential of information technologies available to the academic communities for over a dozen years, but not used for various reasons, is released. As a specific case of this trend, a migration from brick-and-mortar voting towards the remote voting by electronic means may intensify in the post-pandemic period at universities. This phenomenon requires an in-depth analysis, the aim of which is to facilitate the management of academic units to choose optimal solutions in the coming years, when such decisions can be made without time pressure and invasive sanitary restrictions. In the process of electronic remote voting, security is a key requirement, which has a number of various attributes: authenticity, correctness, anonymity, verifiability, receiptfreeness, availability. In response to these, to some extent contradictory, requirements, the world of science has been developing protocols and systems based on cryptographic formalisms for years. This article explains the main challenges related to security of remote electronic voting, from which even advanced solutions implemented in academic practice are not free.
Go to article

Authors and Affiliations

Adam Wójtowicz
1

  1. Katedra Technologii Informacyjnych, Uniwersytet Ekonomiczny w Poznaniu

This page uses 'cookies'. Learn more