Schematic diagram of the RSA algorithm encryption and decryption and key generation.

Schematic diagram of the RSA algorithm encryption and decryption and key generation.

Source publication
Article
Full-text available
The previous encryption methods of hospital financial data have the problem of overburden. Therefore, a research study on hybrid encryption of hospital financial data based on Noekeon algorithm is proposed. From the basic principles of the Noekeon algorithm and the application and implementation of the Noekeon algorithm, a hybrid encryption scheme...

Similar publications

Article
Full-text available
The objective of this study is to create a misconception test instrument for identifying and understanding misconceptions in students regarding Bernoulli's Principle, particularly during hybrid learning. The validity and reliability of the test instrument are described in order to assess its effectiveness. Descriptive analysis techniques were emplo...

Citations

... Yao and Su [18] address the security of hospital financial data, presenting the Noekeon algorithm-a hybrid encryption approach incorporating the RSA cryptography scheme and the DES algorithm. The authors advocate encrypting the message twice, asserting efficient and high-speed encryption and decryption for substantial volumes of hospital financial data. ...
... Tis article has been retracted by Hindawi, as publisher, following an investigation undertaken by the publisher [1]. Tis investigation has uncovered evidence of systematic manipulation of the publication and peer-review process. ...
... Cryptography is a scrambled language that is called as art and science of secret writing, which cannot be achieved without the use of creative action and entrepreneurship [1]. It incorporates mathematical techniques as well as mechanisms related to information security or data security. ...
... With this method, the decryption output is similar to when the plaintext is processed directly, which is very convenient. In order to combine the advantages of the current research results for the encryption of users' private and financial data, a new hybrid encryption model is proposed [1]. In both private and public sectors, the malicious activities on cyber infrastructure are increasing every day, and thus the security requirements are also increasing [12], [13]. ...
... Different cryptographic tests and metrics are used to measure identify the scope, performance and security level of the new type of hybrid algorithm [14]. According to Yao and Su [1], focuses on securing hospital financial data. In the article, the author presented a hybrid encryption algorithm called the Noekeon algorithm. ...
Article
Full-text available
Today's digital data transmission over unsecured wired and wireless communication channels is making encryption algorithms an increasingly important tool for securing data and information. Hybrid encryption techniques combine encryption schemes of either two symmetric keys or both symmetric and asymmetric encryption methods, and that provides more security than public or private key single encryption models. Currently, there are many techniques on the market that use a combination of cryptographic algorithms and claim to provide higher data security. Many hybrid algorithms have failed to satisfy customers in securing data and cannot prevent all types of security threats. To improve the security of digital data, it is essential to develop novel and resilient security systems as it is inevitable in the digital era. The recommended algorithm scheme is a combination of the well-known Rivest Shamir Adleman (RSA) algorithm and a simple symmetric key (SSK) algorithm. The aim of this study is to develop a better encryption method using RSA and a newly proposed symmetric SSK algorithm. We believe that the proposed hybrid cryptographic algorithm provides more security and privacy.
Article
Full-text available
In modern healthcare, transmitting digital medical images through open-source networks for diagnosis in remote centers poses a significant security challenge due to the sensitive patient information involved. This paper presents an algorithm designed to encrypt these crucial medical images comprehensively. The algorithm generates hash code to validate image integrity, followed by feature-based watermarking, transformation into the frequency domain via Discrete Cosine Transform (DCT), and encryption using Advanced Encryption Standard (AES) and RSA encryption techniques. Each step plays a pivotal role in fortifying the images against unauthorized access, tampering, or interception during transmission, Guaranteeing the secrecy, unaltered state, and legitimacy of the included medical information. Implementing this encryption algorithm mandates strict adherence to cryptographic best practices, robust execution of encryption algorithms, secure key management, and compliance with industry standards. These meticulous measures bolster the confidentiality and integrity of medical images, which are crucial in protecting patient privacy and maintaining data integrity within healthcare systems. This comprehensive encryption strategy addresses the need for the purpose of ensuring safe and protected delivery and protection of sensitive medical information across networks.