<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.616893</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Computer Software</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgisayar Yazılımı</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Three Part Hybrid Encryption Schema</article-title>
                                                                                                                                        </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-2968-1615</contrib-id>
                                                                <name>
                                    <surname>Gençoğlu</surname>
                                    <given-names>Hakan</given-names>
                                </name>
                                                                    <aff>ISTANBUL SABAHATTIN ZAIM UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-9888-0151</contrib-id>
                                                                <name>
                                    <surname>Yerlikaya</surname>
                                    <given-names>Tarık</given-names>
                                </name>
                                                                    <aff>TRAKYA UNIVERSITY</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20191030">
                    <day>10</day>
                    <month>30</month>
                    <year>2019</year>
                </pub-date>
                                        <volume>7</volume>
                                        <issue>4</issue>
                                        <fpage>384</fpage>
                                        <lpage>390</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20190907">
                        <day>09</day>
                        <month>07</month>
                        <year>2019</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20191008">
                        <day>10</day>
                        <month>08</month>
                        <year>2019</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Hybrid encryption schemes are consist oftwo parts. First part for encryting the text with symmetric algorithm calledDEM (Data Encryption Mechanism) and the second one is for encrypting thesymmetric algorithm key with asymmetric algorithm called KEM (Key EncryptionMechanism). If we think to expand the KEM packet with e-sign, message digestand extra security data for validation and authentication, how will be theencryption of KEM packet and also the performance KEM mechanism. Our study tryto answer that question and also offer a new hybrid encryption mechanism forinformation security.</p></abstract>
                                                                                    
            
                                                            <kwd-group>
                                                    <kwd>Cryptography</kwd>
                                                    <kwd>  hybrid cryptography</kwd>
                                                    <kwd>  data security</kwd>
                                            </kwd-group>
                                                        
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	H. Kodaz “Veri İletiminde Güvenlik İçin Şifreleme”, Selçuk Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 2002[2]	T. Yerlikaya, E. Buluş, N. “Buluş, Asimetrik Şifreleme Algoritmalarında Anahtar Değişim Sistemleri”, Akademik Bilişim 2006 (Ab2006), 9-11 Şubat 2006, Denizli [3]	M. Krishnamurthy, E.S. Seagren, R. Alder, A.W. Bayles, J. Burke, S. Carter, E. Faskha, “Basics of Cryptography and Enryption, How to Cheat at Securing Linux”, 2008, 249- 270.[4]	T. Stapko, “Security Protocols and Algorithms, Practical Embedded Security”, 2008, 49-66.[5]	H. Kodaz, F. M. Botsali “Simetrik Ve Asimetrik Şifreleme Algoritmalarinin Karşilaştirilmasi”, Selçuk-Teknik Dergisi ISSN 1302-6178 Journal of Selcuk-Technic Cilt 9, Sayı:1-2010 Volume 9, Number:1-2010 10 [6]	T. Yerlikaya, E. Buluş, N. Buluş “Asimetrik Şifreleme Algoritmalarinda Anahtar Değişim Sistemleri” AKADEMİK BİLİŞİM 2006 + BilgiTek IV9-11 Şubat 2006  Pamukkale Üniversitesi  Denizli [7]	M. Abe, R. Gennaro, K. Kurosawa, V. Shoup, “Tag-KEM/DEM: A New Framework For Hybrid Encryption And New Analysis Of Kurosawa-Desmedt KEM”, Advances in Cryptology – Eurocrypt 2005, Lncs 3494, Pp. 128–146, 2005.[8]	K. Yıldırım, H. E. Demiray, “Simetrik Ve Asimetrik Şifreleme Yöntemlerine Metotlar: Çırpılmış Ve Birleşik Akm-Vkm”, Gazi Üniv. Müh. Mim. Fak. Der. Cilt 23, No 3, 539-548, 2008[9]	S. C. Iyer, R.R. Sedamkar, S. Gupta, “A Novel Idea On Multimedia Encryption Using Hybrid Crypto Approach”, 7th International Conference On Communication, Computing And Virtualization 2016, Procedia Computer Science 79 ( 2016 ) 293 – 298.[10]	E. Atar, O. K. Ersoy, L. Özyılmaz, “Dik Eşleştirme Arayış Yöntemi İle Hibrit Veri Sıkıştırma Ve Optiksel Kriptografi”, Journal Of The Faculty Of Engineering And Architecture Of Gazi University 32:1 (2017) 139-147[11]	T. Arai, S. Obana, “A Password-Protected Secret Sharing Based On Kurosawa-Desmedt Hybrid Encryption”, Fourth International Symposium On Computing And Networking (CANDAR) CANDAR Computing And Networking (CANDAR), 2016 Fourth International Symposium On. :597-603 Nov, 2016[12]	L. Chengliang,  Y. Ning, R. Malekian, W. Ruchuan, “The Hybrid Encryption Algorithm Of Lightweight Data in Cloud Storage”,2nd International Symposium On Agent, Multi-Agent Systems And Robotics (ISAMSR) Agent, Multi-Agent Systems And Robotics (ISAMSR), 2016 2nd International Symposium On. :160-166 Aug, 2016[13]	B.V. Srividya, S. Akhila, “Implementing A Hybrid Crypto-Coding Algorithm For An Image On FPGA”, Information And Communication Technology For Intelligent Systems, ICTIS 2017. (Smart Innovation, Systems And Technologies, 2018, 84:72-84)[14]	F. Yavuzer-Aslan, M. T.  Sakallı, B. Aslan, “Önemli Blok Şifrelerde Kullanılan Doğrusal Dönüşümlerin İncelenmesi”,  Akademik Bilişim’12 - XIV. Akademik Bilişim Konferansı Bildirileri 1 - 3 Şubat 2012 Uşak Üniversitesi 49[15]	M Özbek, “Adli Bilişim Uygulamalarında Orijinal Delil Üzerindeki Hash Sorunları”, 1st International Symposium on Digital Forensics and Security (ISDFS’13), 20-21 May 2013, Elazığ, Turkey[16]	http://primes.utm.edu/curios/index.php?start=301&amp;stop=1000</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
