Security and Privacy Protection for Online Electronic Documents Based on Novel Encryption Techniques

  • Amer Ibrahim
  • , Ravi Sekhar
  • , Jamal Fadhil Tawfeq
  • , Sinan Q. Salih
  • , Pritesh Shah
  • , Ahmed Dheyaa Radhi

Research output: Contribution to journalArticlepeer-review

11 Citations (Scopus)

Abstract

Corporate strategies have employed techniques that enter the domain of shadow and espionage in this rapidly developing, technologically competitive business environment. Supporting a security strategy is a way to counter these possible dangers. To preserve corporate success in the marketplace, network security needs to be crucial to the protection of electronic documents. Encryption technology has become more important in recent years for protecting online digital documents. This research was motivated by the fact that document verification has become quite time-consuming and difficult due to a variety of challenging and laborious processes. Existing technologies often malfunction when a single kind of encryption, such as AES, Data Encryption Standard (DES), or Rivest, Shamir, Adleman (RSA), is utilized at the request of the customer. Therefore, this study proposes hybrid cryptography, which integrates two novel algorithms into existing encryption protocols. A digital signature is generated for the data when a user uploads a data. The data are encrypted in parallel using the suggested Secured Hash Function-256 (SHA-256) method with improved DES and RSA (SHA-256+Enhanced DES+RSA). The proposed encryption method was shown to be more accurate than previous studies in experimental evaluations of data encryption.

Original languageEnglish
Pages (from-to)21-28
Number of pages8
JournalJournal of Intelligent Systems and Internet of Things
Volume11
Issue number1
DOIs
Publication statusPublished - 2024
Externally publishedYes

Keywords

  • Digital Signatures
  • Encryption, and SHA-256 with Enhanced DES and RSA algorithm (SHA-256+Enhanced DES+RSA)
  • Online Electronic Document

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Security and Privacy Protection for Online Electronic Documents Based on Novel Encryption Techniques'. Together they form a unique fingerprint.

Cite this