首页    期刊浏览 2024年12月02日 星期一
登录注册

文章基本信息

  • 标题:Prototype Knowledge Management System with Quality Function Deployment Method: a Case Study at K Software House
  • 本地全文:下载
  • 作者:Tutik Lestari ; Sofian Lusa ; Arni Retno Mariana
  • 期刊名称:International Journal of Computer Techniques
  • 电子版ISSN:2394-2231
  • 出版年度:2018
  • 卷号:5
  • 期号:2
  • 页码:86-91
  • 语种:English
  • 出版社:International Research Group - IRG
  • 摘要:There Abstract- cryptanalyst are professional in how to fracture the encryption techniques. We require securing our programs and documents from cryptanalyst. Security of information means protecting data from unauthorized right to use in cloud environment. There are many techniques to reach the security of information from unauthorized entrance. There are two cryptographic techniques used for data encryption which are symmetric and Asymmetric techniques. Symmetric key encryption algorithms are computationally fast compared to asymmetric encryption algorithms (Like RSA). However, since the identical secret key is used for symmetric encryption and decryption, we have the crisis of securely distributing that secret key. Asymmetric key infrastructure in PKI does not rely on circulation of any private key. However, the familiar asymmetric algorithms are used for bulk encryption with recent computation capability. While SHA is collision resistant to a variety of block cipher algorithms. Thus for superior security performance, we propose a system which would integrate the advantages of these algorithms namely SHA, RSA which will be a hybrid approach of encrypting data. SHA is adopted in this mechanism to verify the integrity of the significance. Three major security principle such as authentication, confidentiality and integrity are achieved together using this method.
国家哲学社会科学文献中心版权所有