Information Security using GNU Privacy Guard
The CIA trinity of data system confidentiality, integrity, and availability is significantly reliant on communication networks in today's society. A major portion of the vital communication system infrastructure is dependent on huge, sophisticated software systems that may have defects and pose...
Uloženo v:
| Vydáno v: | 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC) s. 0295 - 0300 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
08.03.2023
|
| Témata: | |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The CIA trinity of data system confidentiality, integrity, and availability is significantly reliant on communication networks in today's society. A major portion of the vital communication system infrastructure is dependent on huge, sophisticated software systems that may have defects and pose security threats. Data security has always been a primary issue, both online and offline. Several email, data, and communication systems are usually several years old and must be upgraded on a regular basis to keep possible hazards at bay. As a result, there is a pressing need to protect communication networks, internet data, and email systems from external threats. An overview of the GNU Privacy Guard (GNUPG) in the era of information security is presented in this paper. The paper also investigates the possibility and requirement of data transmission security. There is a description of various types of cryptography algorithms, mathematics, and science used in various asymmetric key algorithms. Furthermore, the GNUPG applications in several fields of keys and certificates are evaluated. |
|---|---|
| AbstractList | The CIA trinity of data system confidentiality, integrity, and availability is significantly reliant on communication networks in today's society. A major portion of the vital communication system infrastructure is dependent on huge, sophisticated software systems that may have defects and pose security threats. Data security has always been a primary issue, both online and offline. Several email, data, and communication systems are usually several years old and must be upgraded on a regular basis to keep possible hazards at bay. As a result, there is a pressing need to protect communication networks, internet data, and email systems from external threats. An overview of the GNU Privacy Guard (GNUPG) in the era of information security is presented in this paper. The paper also investigates the possibility and requirement of data transmission security. There is a description of various types of cryptography algorithms, mathematics, and science used in various asymmetric key algorithms. Furthermore, the GNUPG applications in several fields of keys and certificates are evaluated. |
| Author | Syed, Dabeeruddin Abdulhamid, Shafii Muhammad Zainab, Ameema Al-Kuwari, Mohammed Salem Daen A Al-Ghushami, Abdullah Hussein |
| Author_xml | – sequence: 1 givenname: Dabeeruddin surname: Syed fullname: Syed, Dabeeruddin email: dsyed@tamu.edu organization: Texas A&M University, College Station,Texas,U.S.A – sequence: 2 givenname: Abdullah Hussein surname: Al-Ghushami fullname: Al-Ghushami, Abdullah Hussein email: abdullah.alghushami@ccq.edu.qa organization: Community College of Qatar,Department of Information Technology,Doha,Qatar – sequence: 3 givenname: Ameema surname: Zainab fullname: Zainab, Ameema email: azain@tamu.edu organization: Texas A&M University, College Station,Texas,U.S.A – sequence: 4 givenname: Shafii Muhammad surname: Abdulhamid fullname: Abdulhamid, Shafii Muhammad email: shafii.abdulhamid@ccq.edu.qa organization: Community College of Qatar,Department of Information Technology,Doha,Qatar – sequence: 5 givenname: Mohammed Salem Daen A surname: Al-Kuwari fullname: Al-Kuwari, Mohammed Salem Daen A email: mohammed62069@ccq.edu.qa organization: Community College of Qatar,Department of Information Technology,Doha,Qatar |
| BookMark | eNo1z81KxDAUQOEIutBx3kAwD2Br_prmLiVoHRhU0MHlcJvcSsBJJdMKfXsX6ursPjgX7DSPmRi7lqKWUsCt9---abUxtRJK11IIAAn2hK2hBacbobVytjlnN5s8jOWAUxozf6UwlzQtfD6m_MG7px1_Kekbw8K7GUu8ZGcDfh5p_dcV2z3cv_nHavvcbfzdtkpKmKkaArrBOmlsG5XpjXQigDXQC6kskLQk0ZLrexUjtAjOaLIiIjZAAaPTK3b16yYi2n-VdMCy7P8n9A_gUUCI |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/CCWC57344.2023.10099196 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798350332865 |
| EndPage | 0300 |
| ExternalDocumentID | 10099196 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i204t-fca8f681467d24b4180c9649b01269e16e1a6e8bb2dd97a9843e60daa59ecad83 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000995182600047&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Thu Jan 18 11:14:46 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i204t-fca8f681467d24b4180c9649b01269e16e1a6e8bb2dd97a9843e60daa59ecad83 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_10099196 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-March-8 |
| PublicationDateYYYYMMDD | 2023-03-08 |
| PublicationDate_xml | – month: 03 year: 2023 text: 2023-March-8 day: 08 |
| PublicationDecade | 2020 |
| PublicationTitle | 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC) |
| PublicationTitleAbbrev | CCWC |
| PublicationYear | 2023 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.8321558 |
| Snippet | The CIA trinity of data system confidentiality, integrity, and availability is significantly reliant on communication networks in today's society. A major... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 0295 |
| SubjectTerms | Asymmetric key algorithm Electronic mail Encryption GNU Privacy Guard Graphics processing units Information security OpenPGP Passwords Privacy Public key Symmetric key algorithm |
| Title | Information Security using GNU Privacy Guard |
| URI | https://ieeexplore.ieee.org/document/10099196 |
| WOSCitedRecordID | wos000995182600047&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwMhECa28eBJjTW-swePUlmgPM4bq6emiTb21gwwa3ppTd028d8LdKvx4MFwIWQIYQYyZJhvPkJupTKpDJymyvJApQVLHUigNdbGeCUYIMtkE3o0MtOpHbdg9YyFQcScfIb91M1_-WHp1ylUFm94fM_EI9MhHa3VFqzV5myVzN5X1Ws10EKmUAkX_Z30L96U7DaGh_9c8Ij0fgB4xfjbtRyTPVyckLsWOpRUWTy3vHNFSlx_Kx5HkzhhvgH_WWSr98hk-PBSPdGW7IDOOZMNrT2YWqWAnA5cOlka5q2S1kUPoiyWCktQaJzjIVgN1kiBigWAgUUPwYhT0l0sF3hGCmZklCid8byWzDvDQYTYlBugcBLOSS9tdfa-rWcx2-3y4o_xS3KQFJozr8wV6TarNV6Tfb9p5h-rm2yFLxmaiR4 |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA5aBT2pWPHtHjyamk2y2eS8WCvWpWCLvZU8ZqWXttS24L83SbeKBw-SSwgTQmYSJkzmmw-hWy5kKAOXY6Gow1xphY3mGldQSWkFIxpIJJvIy1IOh6pXg9UjFgYAYvIZtEI3_uW7qV2GUJm_4f4944_MNtrJOKdkDdeqs7ZSou6L4q3IcsZDsISy1kb-F3NKdBztg38ueYiaPxC8pPftXI7QFkyO0V0NHgrKTF5r5rkkpK6_J4_lwE8Yr7T9TKLdm2jQfugXHVzTHeAxJXyBK6tlJUJILneUG55KYpXgyngfIhSkAlItQBpDnVO5VpIzEMRpnSmw2kl2ghqT6QROUUIk9xKpkZZWnFgjqWbON2EyYIbrM9QMWx3N1hUtRptdnv8xfoP2Ov2X7qj7VD5foP2g3JiHJS9RYzFfwhXatavF-GN-HS3yBW87jGU |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+IEEE+13th+Annual+Computing+and+Communication+Workshop+and+Conference+%28CCWC%29&rft.atitle=Information+Security+using+GNU+Privacy+Guard&rft.au=Syed%2C+Dabeeruddin&rft.au=Al-Ghushami%2C+Abdullah+Hussein&rft.au=Zainab%2C+Ameema&rft.au=Abdulhamid%2C+Shafii+Muhammad&rft.date=2023-03-08&rft.pub=IEEE&rft.spage=0295&rft.epage=0300&rft_id=info:doi/10.1109%2FCCWC57344.2023.10099196&rft.externalDocID=10099196 |