Preview

Bulletin of Shakarim University. Technical Sciences

Advanced search

Development of information technology for secure file storage based on hybrid cryptography methods

https://doi.org/10.53360/2788-7995-2023-4(12)-6

Abstract

This article explores the development of information technology for secure file storage based on hybrid cryptography methods. It highlights the importance of secure file storage in the digital age and introduces hybrid cryptography as a solution for enhanced data security. The purpose of the article is to provide a comprehensive understanding of the benefits and advancements in hybrid cryptography for secure file storage.

The article discusses the differences between symmetric and asymmetric encryption algorithms and introduces hybrid cryptography as a combination of both. It delves into the advantages of hybrid cryptography, emphasizing its ability to provide robust security and efficient data protection. The use of hybrid cryptography in encryption at rest and encryption in transit is examined, highlighting its role in securing stored data and ensuring secure data transmission.

Moreover, the article explores the authentication, integrity, and reliability features provided by hybrid cryptography. It discusses the importance of key management and its impact on secure file storage. 

About the Authors

A. T. Manap
Astana IT University
Kazakhstan

Aбусаид Manap - master’s degree

010000, Astana, Mangilik El Avenue, 55/11 



G. A. Abitova
Astana IT University
Kazakhstan

Gulnara Askerovna Abitova – PhD, Associate Professor

010000, Astana, Mangilik El Avenue, 55/11 



References

1. Paar, C., & Pelzl, J. (2010). Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media.

2. Stinson, D. R. (2018). Cryptography: Theory and Practice (4th ed.). CRC Press.

3. Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.

4. Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook of applied cryptography. CRC press

5. Ristenpart, T., Shrimpton, T., & Shacham, H. (2010). Careful with composition: limitations of the multi-key security notion. In Proceedings of the 17th ACM conference on Computer and communications security (pp. 605-616).

6. Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC Press.

7. Stallings, W. (2017). Cryptography and network security: principles and practice. Pearson.

8. AlHussein, M., & Barker, A. D. (2018). Secure Data Transmission: A Comprehensive Survey. IEEE Communications Surveys & Tutorials, 20(1), 1-33

9. Chen, H., Wang, Q., & Zhang, L. (2019). "Privacy-Preserving Cryptographic Protocols for Secure Multi-Party Computation." Journal of Computer Science and Technology, 34(6), 1261-1277

10. Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography engineering: design principles and practical applications. John Wiley & Sons.


Review

For citations:


Manap A.T., Abitova G.A. Development of information technology for secure file storage based on hybrid cryptography methods. Bulletin of Shakarim University. Technical Sciences. 2023;1(4(12)):39-46. https://doi.org/10.53360/2788-7995-2023-4(12)-6

Views: 179


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2788-7995 (Print)
ISSN 3006-0524 (Online)
X