Segui questo link per vedere altri tipi di pubblicazioni sul tema: Cryptography.

Articoli di riviste sul tema "Cryptography"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Cryptography".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)". Journal of Physics: Conference Series 2386, n. 1 (1 dicembre 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.

Testo completo
Abstract (sommario):
Abstract Elliptic Curve Cryptography (ECC) is one of the strongest and most efficient cryptographic techniques in modern cryptography. This paper gives the following introduction: The introduction of cryptography’s development; the introduction of the elliptic curve; the principle of ECC; the horizontal comparison between ECC and other types of cryptography; the modern breakthrough of ECC; the applications of ECC; by using a method of literature review. The study’s findings indicate that this factor is responsible for the rapid historical development of cryptography, from the classical password to the leap to modern cryptography. Elliptic Curve Cryptography (ECC), as one of the most important modern cryptographies, is stronger than most other cryptographies both in terms of security and strength, because it uses an elliptic curve to construct and, at the same time, uses mathematical operations to encrypt and generate keys. At the same time, elliptic curve cryptography can continue to improve the speed and intensity with the improvement of accelerators, scalar multiplication, and the speed of order operation. The applications of the elliptic curve in ECDSA and SM2 are very efficient, which further illustrates the importance of elliptic curve cryptography.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Goldreich, Oded. "Cryptography and cryptographic protocols". Distributed Computing 16, n. 2-3 (1 settembre 2003): 177–99. http://dx.doi.org/10.1007/s00446-002-0077-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Anilkumar, Chunduru, Bhavani Gorle e Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution". Applied and Computational Engineering 8, n. 1 (1 agosto 2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.

Testo completo
Abstract (sommario):
Security knowledge is one of the foremost challenges in the present day. When the topic is about Information security, the concept of cryptography comes into the picture. Every day, people and organizations use cryptography to maintain the confidentiality of their communications and data as well as to preserve their privacy. Today, one of the most successful methods used by businesses to protect their storage systems, whether at rest or in transit, is cryptography. Yet, cryptography is an effective technique to secure the data, the modern technology can break the cryptographic techniques. But some data encryption algorithms are several times stronger than today's conventional cryptography and can be constructed using quantum computing. They are "Quantum Cryptographic Algorithms ". Quantum cryptography uses the rules of quantum physics instead of classical encryption, which is based on mathematics, to protect and transmit data in a way that cannot be intercepted. Quantum key distribution is the greatest illustration of quantum cryptography and offers a safe solution to the key exchange issue. The proposed work deals with quantum cryptography and mainly focuses on how the quantum cryptographic algorithm is more secure than traditional cryptography.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Rusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE". RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, n. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.

Testo completo
Abstract (sommario):
The article is devoted to the analysis of modern trends in the development of cryptography, which are related to the issues of cryptography of the past and are reflected in the prospects for the development of cryptography in the future. New trends in the development of cryptography that are relevant in recent decades are highlighted, the main ones of which include: awareness of the mathematical nature of data encryption problems, the rapid increase in the volume of processed and encrypted information that is distributed among a large unlimited circle of users of the modern data transmission devices, practical and theoretical interest of user s in cryptography. It analyzes the continuity of the issues facing cryptography. Among such issues there are: an importance of the human factor in the use of any cryptographic system, the traditional participation of the state in the cryptography development, as well as the theoretical substantiation of ideas of the cryptographic data protection, generalizing the practical experience of using encryption. The author also analyzes the main tasks of cryptography, which include identification, authentication, maintaining the integrity, confidentiality and availability of information during its transfer and storage, emphasizing the need to solve them within the framework of the design and implementation of the complex security systems. Using the development of quantum cryptography as an example, the article emphasizes that the development of new approaches to the cryptographic data protection traditionally leads to the emergence of new vulnerability factors, which means that the traditional issue of cryptography is also to stay ahead of potential attackers.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Goyal, Rohit. "Quantum Cryptography: Secure Communication Beyond Classical Limits". Journal of Quantum Science and Technology 1, n. 1 (31 marzo 2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.

Testo completo
Abstract (sommario):
Quantum cryptography promises secure communication protocols that surpass the limitations of classical cryptography. By leveraging the principles of quantum mechanics, particularly the phenomenon of quantum entanglement and the uncertainty principle, quantum cryptography protocols offer provable security guarantees against eavesdropping attacks. In this paper, we provide an overview of quantum cryptography, discussing its theoretical foundations, key protocols such as quantum key distribution (QKD), and experimental implementations. We highlight the advantages of quantum cryptography over classical cryptographic techniques and explore its potential applications in secure communication networks, financial transactions, and data privacy. Furthermore, we discuss ongoing research efforts and challenges in the practical deployment of quantum cryptography systems, including the development of robust quantum hardware and the integration of quantum cryptographic protocols into existing communication infrastructures. Overall, quantum cryptography holds great promise for enabling secure communication channels that are resilient to quantum attacks, paving the way for a new era of ultra-secure information exchange.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Victor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat e Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection". E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.

Testo completo
Abstract (sommario):
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the threats posed by bad actors. This abstract examines the evolution of secure communication protocols and data protection techniques as it relates to the advancements in cryptography. The development of post-quantum cryptography is the most notable development in cryptography discussed in this study. As quantum computers become more powerful, they pose a serious threat to traditional cryptographic algorithms, such as RSA and ECC. Designing algorithms that are immune to attacks from quantum computers is the goal of post-quantum cryptography. Lattice-based, code-based, and multivariate-based cryptography are only a few of the methods that have been investigated in this context.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Anilkumar, Chunduru, Swathi Lenka, N. Neelima e Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution". Scalable Computing: Practice and Experience 25, n. 1 (4 gennaio 2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.

Testo completo
Abstract (sommario):
Security awareness is one of the most pressing topics in today's globe. The idea of cryptography is introduced when the subject is information security. Conventional cryptography-based security techniques rely on the presumption that keys are shared before secure connections. The most crucial factor to consider when integrating cryptographic operations into account when integrating cryptographic operations in with any system is the safe key management strategy required for sending and transferring a secret key between two entities The systems will be vulnerable to bugs and possibly fatal external assaults if the fundamental management methods are poor A method for securely encrypting data sent between parties is quantum cryptography. and spotting eavesdroppers trying to overhear the conversation. Quantum cryptography may be the solution to these issues a quantum cryptography application, Quantum Key Distribution (QKD), refers to the production of a cryptographic key with unconditional security assured by physical rules. Quantum cryptography is a kind of encryption. We examine the quantum key exchange protocol (BB84 protocol) in this study and the way that it significantly improves data transfer security when compared to standard encryption techniques. The main objective of quantum cryptography is to offer a trustworthy way to provide a secure method of communication between the intended peers only and to detect the Eavesdropper presence.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

WANG, XINGYUAN, MING LIU e NINI GU. "TWO NEW CHAOTIC CRYPTOGRAPHIES BASED ON DIFFERENT ATTRACTOR-PARTITION ALGORITHMS". International Journal of Modern Physics B 21, n. 27 (30 ottobre 2007): 4739–50. http://dx.doi.org/10.1142/s0217979207038071.

Testo completo
Abstract (sommario):
The paper analyses the limitation of Baptista cryptography in partitioning an attractor, and proposes two new attractor-partition methods: uniform-partition algorithm and dynamic-partition algorithm. They are different from the equal-interval-partition algorithm in Baptista cryptography, but dividing the attractor according to the attractor's natural invariant density and plaintext density, respectively. The comparative experiment indicates: the two new methods improve the unbalanced cryptograph distribution and cryptograph length in Baptista cryptography, they are also able to reduce the iteration time in chaotic systems effectively, which has improved decryption time and cryptographies' security.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Shashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations". Communications on Applied Nonlinear Analysis 31, n. 4s (5 luglio 2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.

Testo completo
Abstract (sommario):
The rapid advancements in digital technologies have necessitated the development of robust information security measures. This paper explores the intersection of algebra and cryptography, focusing on how algebraic principles can enhance cryptographic techniques to provide stronger security foundations. By leveraging mathematical structures such as groups, rings, and fields, we can address critical challenges in encryption, secure communications, and data privacy. This study reviews key algebraic methods used in contemporary cryptographic protocols, including elliptic curve cryptography, homomorphic encryption, and lattice-based cryptography, and demonstrates their practical applications through detailed case studies. Our comparative analysis highlights the superior performance and security of algebra-based cryptographic solutions compared to traditional methods. Finally, we discuss the emerging trends and future directions in algebraic cryptography, emphasizing the potential of these mathematical foundations to address the evolving threats in information security.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Yadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems". Universal Research Reports 10, n. 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.

Testo completo
Abstract (sommario):
Lattice-based cryptography has emerged as a powerful paradigm for constructing secure cryptographic primitives, offering resistance to quantum attacks and providing a versatile framework for building post-quantum cryptographic systems. This research paper provides an in-depth exploration of lattice-based cryptography, focusing specifically on its applications for problems based on Ring Learning with Errors (RLWE). We analyze the fundamental concepts of lattice theory, delve into the RLWE problem, and highlight the security properties and challenges associated with lattice-based schemes. Furthermore, we discuss various real-world applications of lattice-based cryptography, demonstrating its potential for secure communication, privacy-preserving protocols, and post-quantum cryptography.
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Oh, Chaerin, Woosang Im, Hyunil Kim e Changho Seo. "Recent Trends in Cryptanalysis Techniques for White-box Block Ciphers". Korean Institute of Smart Media 12, n. 9 (30 ottobre 2023): 9–18. http://dx.doi.org/10.30693/smj.2023.12.9.9.

Testo completo
Abstract (sommario):
Black box cryptography is a cryptographic scheme based on a hardware encryption device, operating under the assumption that the device and the user can be trusted. However, with the increasing use of cryptographic algorithms on unreliable open platforms, the threats to black box cryptography systems have become even more significant. As a consequence, white box cryptography have been proposed to securely operate cryptographic algorithms on open platforms by hiding encryption keys during the encryption process, making it difficult for attackers to extract the keys. However, unlike traditional cryptography, white box-based encryption lacks established specifications, making it challenging to verify its structural security. To promote the safer utilization of white box cryptography, CHES organizes The WhibOx Contest periodically, which conducts safety analyses of various white box cryptographic techniques. Among these, the Differential Computation Analysis (DCA) attack proposed by Bos in 2016 is widely utilized in safety analyses and represents a powerful attack technique against robust white box block ciphers. Therefore, this paper analyzes the research trends in white box block ciphers and provides a summary of DCA attacks and relevant countermeasures, adhering to the format of a research paper..
Gli stili APA, Harvard, Vancouver, ISO e altri
12

BAFTIU, Naim. "Analysis and use of Cryptography techniques in programming language C#: Coding and Decoding". PRIZREN SOCIAL SCIENCE JOURNAL 4, n. 3 (31 dicembre 2020): 1–10. http://dx.doi.org/10.32936/pssj.v4i3.165.

Testo completo
Abstract (sommario):
Cryptography is an old idea and science, but its approach exists and plays a large role in modernization today. Conventional cryptographic techniques form the basis of today's cryptographic algorithm. The different categories of algorithms have their respective features; internally, in performance and implementation. Cryptographic schemes and mechanisms have undergone continuous improvement. The application of cryptography has grown increasingly, ranging from limited use in state institutions to widespread use by private individuals and companies. The increased use of the Internet has significantly influenced the nature of applications and the way we communicate. Data security dictates the use of different cryptographic techniques. For this reason, we analyze in detail the various coding techniques by evaluating their performance and efficiency. Regarding the new paradigms in cryptography there are also new cryptographic schemes whose application requires detailed study and analysis. The classical cryptography algorithm is the oldest algorithm that was used long before the cryptographic system was discovered. Currently, the system has been widely applied to secure data, and using new methods in a way to improve existing methods. In this thesis the use of cryptographic methods using the C # programming language will be discussed.
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Virk, Udayveer Singh, Devansh Verma, Gagandeep Singh e Prof Sheetal Laroiya Prof. Sheetal Laroiya. "Analyzing Cryptographic Techniques and Machine Learning Algorithms for Crime Prediction". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 10 (22 ottobre 2024): 1–6. http://dx.doi.org/10.55041/ijsrem38099.

Testo completo
Abstract (sommario):
This report discusses cryptography techniques. Network security is defined as "keeping information hidden and secure from unauthorized users," whereas cryptography is defined as "the science of data protection." The Fundamental Requirements for Data Transmission are addressed in this work and as well as security attacks such as Data Transmission Interruption, Interception, and Modification. The Cryptographic Framework is explained using a generalized function, in which data is encrypted and decrypted using techniques such as the RSA algorithm, Hash Functions, and other cryptographic algorithms.SVM algorithms to analysis and predict the future cyber crime. This report introduces Cryptography Techniques. Cryptography is “The science of protecting data” & Network Security “keeping information private and Secure from unauthorized Users”. This paper gives the Fundamental Requirements for the Data Transmission, the security attacks like Interruption, Interception and Modification of the data Transmission. Keywords—cryptography, cybersecurity, machine learning, cybercrime prediction
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Hammad, Baraa Tareq, Ali Maki Sagheer, Ismail Taha Ahmed e Norziana Jamil. "A comparative review on symmetric and asymmetric DNA-based cryptography". Bulletin of Electrical Engineering and Informatics 9, n. 6 (1 dicembre 2020): 2484–91. http://dx.doi.org/10.11591/eei.v9i6.2470.

Testo completo
Abstract (sommario):
Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. Data encryption is made possible via DNA sequences. In this paper, two cases utilizing different DNA properties were studied by combining the DNA codes with those conventional cryptography algorithms. The first case concerned on symmetric cryptography that involved DNA coding with OTP (one time pad) algorithms. Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. As observed, the computational time of RSA algorithm combined with DNA coding was longer. In order to alleviate this problem, data redundancy was reduced by activating the GZIP compressed algorithm. The present experimental results showed that DNA symmetric cryptography worked quite well in both time and size analyses. Nevertheless, it was less efficient than the compressed DNA asymmetric cryptography.
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Kumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 04 (10 aprile 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.

Testo completo
Abstract (sommario):
The incorporation of cryptographic techniques is crucial for guaranteeing data privacy and security processed additionally sent inside IOT ecosystems, particularly as the IOT keeps growing. Examining problems including resource limitations, scalability, and the dynamic nature of IOT environments, this research paper explores the complex obstacles that cryptographic solutions confront considering the IOT. Lightweight cryptography, post-quantum cryptography, and blockchain integration are some of the new trends and future prospects in cryptographic research that are examined in this study in an effort to address these issues. This work offers a useful viewpoint for scholars, practitioners, and legislators engaged in the constantly changing field of cryptographic protocols inside the IOT framework by clarifying current problems and projecting future advancements. Keywords— Cryptography, Internet of Things (IOT), Security,Challenges
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Et. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n. 2 (10 aprile 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.

Testo completo
Abstract (sommario):
Visual Cryptography is an encryption technique which performs only encryption in cryptography, and it is used to encrypt every visual data. And this cryptography is different and unique in all cryptographic techniques, because of not performing decryption process mechanically, and that is done mechanically. In normal visual cryptography only black and white images are encrypted. In this paper we propose a different type of visual cryptography scheme for colour imagesin CMY format. And it protects the secret of the original image and no other techniques does not decrypt it except our decryption technique.
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Teja, Penumantra Satya Sai, Mounika Lakshmi P e Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols". International Research Journal of Electronics and Computer Engineering 4, n. 3 (30 settembre 2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.

Testo completo
Abstract (sommario):
Quantum cryptography is a new method of communication offering the security of the inviolability by using Law of Nature.Quantum Cryptography uses different secure communication by applying the phenomena of quantum physics. Unlike traditional classical cryptography, which uses mathematical techniques to restrict eavesdroppers, quantum cryptography is focused on the properties of physics of light for information. Quantum cryptography depends only on the validity of quantum theory, i.e., it is guarantied directly by the laws of physics. This is a different from any classical cryptographic techniques. This paper summarizes the current state of quantum cryptography and provides potential extensions of its feasibility as a mechanism for securing existing communication systems.
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Sabani, Maria E., Ilias K. Savvas e Georgia Garani. "Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography". Signals 5, n. 2 (13 aprile 2024): 216–43. http://dx.doi.org/10.3390/signals5020012.

Testo completo
Abstract (sommario):
The swift advancement of quantum computing devices holds the potential to create robust machines that can tackle an extensive array of issues beyond the scope of conventional computers. Consequently, quantum computing machines create new risks at a velocity and scale never seen before, especially with regard to encryption. Lattice-based cryptography is regarded as post-quantum cryptography’s future and a competitor to a quantum computer attack. Thus, there are several advantages to lattice-based cryptographic protocols, including security, effectiveness, reduced energy usage and speed. In this work, we study the learning with errors (LWE) problem and the cryptosystems that are based on the LWE problem and, in addition, we present a new efficient variant of LWE cryptographic scheme.
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Dabola, Shashank. "Chat Secure-Messaging Application Based on Secure Encryption Algorithm". International Journal for Research in Applied Science and Engineering Technology 12, n. 3 (31 marzo 2024): 303–5. http://dx.doi.org/10.22214/ijraset.2024.58817.

Testo completo
Abstract (sommario):
Abstract: This study aims to explore the application of cryptography in various chat interfaces. Utilizing a systematic literature review methodology, we examine research conducted across various scientific platforms that bridge cryptography and the chat sector, as well as the intersection of cryptograph and database. The potential for advanced encryption algorithms to enhance the security of the user data is enormous. Implementing cryptography in chat interface presents competitive advantages, as numerous researchers have proposed and validated models that effectively optimize the use of cryptography in sharing data b/w the users
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Annu. "Algebraic Structures and Their Applications in Modern Cryptography". Innovative Research Thoughts 10, n. 3 (25 luglio 2024): 52–59. http://dx.doi.org/10.36676/irt.v10.i3.1433.

Testo completo
Abstract (sommario):
Modern cryptography relies heavily on the principles of algebraic structures to ensure the security and integrity of data. This paper explores the fundamental algebraic structures that underpin contemporary cryptographic systems, including groups, rings, fields, and lattices. We provide a detailed examination of how these structures are employed in various cryptographic algorithms and protocols, such as public-key cryptography, digital signatures, and hash functions. an overview of basic algebraic concepts and their properties, followed by an in-depth analysis of their applications in cryptographic schemes. For instance, the use of elliptic curve groups in Elliptic Curve Cryptography (ECC) offers enhanced security with smaller key sizes compared to traditional systems like RSA. Similarly, lattice-based cryptography presents promising solutions for post-quantum security, leveraging the hardness of lattice problems to resist attacks by quantum computers. the role of algebraic structures in the development of advanced cryptographic techniques, such as homomorphic encryption, which allows computations on encrypted data without decryption, and zero-knowledge proofs, which enable the verification of information without revealing the information itself. Through these examples, we illustrate the critical importance of algebraic structures in achieving robust and efficient cryptographic systems.
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Singh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications". Mathematical Statistician and Engineering Applications 70, n. 1 (31 gennaio 2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.

Testo completo
Abstract (sommario):
In many applications, secure communication and data privacy are crucially supported by cryptography. The study of cryptography is now essential for creating strong and dependable security systems due to the growing risks to sensitive information in the digital era. The fundamentals of cryptography, its guiding principles, and its useful applications in securing communication channels and preserving data privacy are explored in this research article.Beginning with symmetric and asymmetric encryption techniques, the inquiry first looks at the fundamental ideas of encryption and decryption. It explores the mathematical underpinnings of cryptography, including discrete logarithms, prime numbers, and modular arithmetic, which serve as the foundation for many cryptographic systems.The paper also examines the various cryptographic protocols and algorithms that are frequently used in secure communication systems. It examines well-known encryption algorithms like Elliptic Curve Cryptography (ECC), Rivest-Shamir-Adleman (RSA), and Advanced Encryption Standard (AES). To determine whether a given algorithm is appropriate for a given use case, its advantages, disadvantages, and distinguishing characteristics are examined.The inquiry also looks at other cryptographic methods including digital signatures, hashing, and key management in addition to encryption. In secure communication systems, these methods are essential for guaranteeing data integrity, authentication, and non-repudiation.
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Khamalwa, Mulemi Simiyu. "Exploring how Commutative Algebra Underpins Cryptographic Protocols and Encryption Methods Used in Secure Communications and Data Protection". NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 5, n. 3 (14 giugno 2024): 58–62. http://dx.doi.org/10.59298/nijses/2024/10.5.586237.

Testo completo
Abstract (sommario):
In the dynamic realm of cybersecurity, the principles of cryptography form the bedrock of secure communication and data protection. This review delves into the pivotal role of commutative algebra in the development and implementation of cryptographic protocols. Commutative algebra, encompassing commutative rings, fields, and groups, is integral to many encryption and decryption algorithms that safeguard digital information. This review explores various algebraic structures, including modular arithmetic, finite fields, and group theory, highlighting their significance in key cryptographic processes such as secure key generation, encryption, and decryption. We examine public key cryptography, underscoring how commutative algebra underpins systems like RSA, ElGamal, and ECC, ensuring secure key exchange and distribution. Finite fields and Galois theory are discussed for their crucial role in cryptographic algorithms, enhancing security and efficiency. Lattice-based cryptography is explored for its resistance to quantum computing attacks, leveraging the complexity of lattice problems in high-dimensional spaces. Cryptographic hash functions, error-correcting codes, and homomorphic encryption are reviewed for their reliance on algebraic properties to maintain data integrity, confidentiality, and security in various applications. Additionally, multivariate polynomial cryptography and post-quantum cryptography are examined for their use of complex algebraic structures to provide robust security against emerging threats, including those posed by quantum computing. This comprehensive review underscores the indispensable role of commutative algebra in the theoretical foundation and practical implementation of modern cryptographic systems, emphasizing its importance in ensuring security, efficiency, and resilience in the face of evolving cyber threats. Keywords: Commutative algebra, cryptographic, protocols, encryption, communications, data protection
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Dubey, Praveer, e Ompal Yadav. "A Survey on Quantum cryptography versus classical Cryptography". International Journal of Current Engineering and Technology 10, n. 06 (31 ottobre 2021): 910–13. http://dx.doi.org/10.14741/ijcet/v.10.6.3.

Testo completo
Abstract (sommario):
Quantum Cryptography is an approach to securing communications by applying the phenomena of quantum physics. Unlike traditional classical cryptography, which uses mathematical techniques to restrict eavesdroppers, quantum cryptography is focused on the physics of information. The development of quantum cryptography was motivated by the short-comings of classical cryptographic methods, which can be classified as either public-key or secret-key Methods. There are classical solutions to insecure communication all rely on making some or assumption, about the computational power of a cheater, about the number of cheaters, or something of this kind. Based on quantum key distribution, one might hope that a quantum computer might allow us to weaken or remove these assumptions.
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Akram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method". ECS Meeting Abstracts MA2022-02, n. 64 (9 ottobre 2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.

Testo completo
Abstract (sommario):
Cryptography is the art of coding and decoding the communication. Cryptography ensures the security of delicate information over some confidentiality breaching resources. In the recent age Cryptography has turned into a battleground of some of the world’s best mathematicians and computer scientists. A number of transforms like Sumudu transform, Laplace transform, Fourier transform, Kamal transform, Mellin transform, Jafari transform, Aboodh transform, N-transform, ELzaki transform, MAHGOUB transform are frequently used in cryptography. Cryptography is of great importance in every field of life including data transmission, data storage, E-Commerce, confidential communication such as credit card transactions and Emails. Cryptography has been a hot topic among the researchers from 4000 years ago until now. In this work, a new cryptographic technique will be introduced. . In this work mathematical transformation known as Laplace transform on hyperbolic function is used for advancement of security purpose in the field of computers and telecommunications, this concept is known as Cryptography. This work includes a mathematical method known as “Laplace Transform” along with “Matrix Decomposition or Triangularization method” in cryptographic process (Encryption and Decryption). Both these mathematical concepts are used in this work to create a new cryptographic technique for the security of data and information in the world of computer. In this technique, Laplace transform on hyperbolic functions along with Matrix decomposition method will be incorporated. The Laplace Transform of hyperbolic function and Lower Triangular Matrix will be used as encryption and inverse Laplace Transformand upper triangular matrix will be used for decryption. Furthermore, the technique will also be explained with its applications.
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Chandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade e Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 11s (10 ottobre 2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.

Testo completo
Abstract (sommario):
Quantum cryptography has emerged as a promising paradigm for secure communication, leveraging the fundamental principles of quantum mechanics to guarantee information confidentiality and integrity. In recent years, the field of quantum cryptography has witnessed remarkable advancements, and the integration of machine learning techniques has further accelerated its progress. This research paper presents a comprehensive review of the latest developments in quantum cryptography, with a specific focus on the utilization of machine learning algorithms to enhance its capabilities. The paper begins by providing an overview of the principles underlying quantum cryptography, such as quantum key distribution (QKD) and quantum secure direct communication (QSDC). Subsequently, it highlights the limitations of traditional quantum cryptographic schemes and introduces how machine learning approaches address these challenges, leading to improved performance and security. To illustrate the synergy between quantum cryptography and machine learning, several case studies are presented, showcasing successful applications of machine learning in optimizing key aspects of quantum cryptographic protocols. These applicatiocns encompass various tasks, including error correction, key rate optimization, protocol efficiency enhancement, and adaptive protocol selection. Furthermore, the paper delves into the potential risks and vulnerabilities introduced by integrating machine learning with quantum cryptography. The discussion revolves around adversarial attacks, model vulnerabilities, and potential countermeasures to bolster the robustness of machine learning-based quantum cryptographic systems. The future prospects of this combined field are also examined, highlighting potential avenues for further research and development. These include exploring novel machine learning architectures tailored for quantum cryptographic applications, investigating the interplay between quantum computing and machine learning in cryptographic protocols, and devising hybrid approaches that synergistically harness the strengths of both fields. In conclusion, this research paper emphasizes the significance of machine learning-enhanced advancements in quantum cryptography as a transformative force in securing future communication systems. The paper serves as a valuable resource for researchers, practitioners, and policymakers interested in understanding the state-of-the-art in this multidisciplinary domain and charting the course for its future advancements.
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Shah, Aayush, Prabhat Mahato e Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm". International Journal for Research in Applied Science and Engineering Technology 11, n. 8 (31 agosto 2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.

Testo completo
Abstract (sommario):
Abstract: This research paper surveys the landscape of cryptography, encompassing historical origins and modern applications. Beginning with foundational concepts, it explores encryption, decryption, ciphers, and keys, spanning symmetric and asymmetric cryptography. Historical context unfolds, tracing cryptography from ancient Egyptian hieroglyphs to Julius Caesar's cipher. The study then transitions to contemporary subjects. Elliptic Curves and Cryptography are investigated, showcasing their significance in secure communication, demonstrating ECC key exchange and AES-GCM encryption using python and Comparative analysis of ECC, RSA, and Diffie-Hellman sheds light on their performance. Zero-Knowledge Proofs are introduced as tools for privacy-preserving verification followed by an exploration of various Zero-Knowledge Proof (ZKP) protocols. By presenting practical implementation examples using Python, the paper illustrates how these proofs can be applied in real-world scenarios. Random Number Generation is examined and distinction between pseudorandom number generators (PRNGs) and cryptographically secure PRNGs (CSPRNGs) is emphasized conducting a thorough comparative analysis of PRNGs and CSPRNGs, considering factors like correlation, independence, periodicity, and entropy. Furthermore, the section evaluates the performance of different random number generation techniques. Fully Homomorphic Encryption emerges as a groundbreaking concept, discussing its mathematical properties, practical implementation, parameter selection, and optimization techniques enabling computation on encrypted data. Cryptographic Secret Sharing Schemes are explored for secure information distribution. The paper concludes by delving into the Chinese Remainder Theorem's applications within modern cryptographic protocols, particularly in RSA decryption and the integration factorization process of the RSA public key cryptosystem. It also provides a comprehensive overview of the theoretical foundations of primality testing, a pivotal aspect of the RSA algorithm. Overall, this research paper provides a comprehensive exploration of cryptography's historical context, core concepts, advanced techniques, and practical implementations, offering valuable insights into the realm of secure communication
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Bala, Romi, e Hemant Pandey. "Advances in Discrete Mathematics: From Combinatorics to Cryptography". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, n. 3 (13 dicembre 2019): 1643–46. http://dx.doi.org/10.61841/turcomat.v10i3.14624.

Testo completo
Abstract (sommario):
Discrete mathematics forms the foundation for various fields, including computer science and cryptography, by providing essential tools for problem-solving in discrete structures. This paper explores the advancements in discrete mathematics, focusing on combinatorics and cryptography. It discusses the basic concepts of combinatorics, such as permutations, combinations, and graph theory, along with their applications in modern cryptography. The paper also examines symmetric and public key cryptography algorithms, including DES, AES, RSA, and ECC, highlighting their key features and security mechanisms. Furthermore, it explores the role of discrete structures, such as sets, relations, functions, and lattices, in cryptography, emphasizing their importance in designing secure cryptographic systems. Overall, this paper provides a comprehensive overview of the advancements in discrete mathematics and their applications in modern cryptography.
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Sedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh e Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY". Computer Science & IT Research Journal 5, n. 2 (18 febbraio 2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.

Testo completo
Abstract (sommario):
This study provides a comprehensive review of quantum cryptography and its implications for U.S. national security in the face of emerging quantum technologies. The primary objective is to investigate the potential of quantum cryptographic methods in creating unbreakable encryption and their future role in enhancing digital security. Employing a systematic literature review and content analysis, the study draws on recent peer-reviewed articles, institutional reports, and academic journals from 2013 to 2023. The methodology focuses on evaluating the evolution, current state, and challenges of quantum cryptography, along with its integration into existing security frameworks. Key findings reveal that Quantum Key Distribution (QKD) and post-quantum cryptography (PQC) offer promising solutions against the threats posed by quantum computing to classical encryption methods. However, the practical implementation of these technologies faces significant challenges, including technological limitations and the need for global standardization. The study underscores the urgency for U.S. national security policy to prioritize the development and integration of quantum-resistant cryptographic technologies and to foster international collaboration for standardization. Finally, the study highlights the transformative potential of quantum cryptography in digital security, emphasizing the need for continued research and collaboration to overcome implementation challenges. Future research directions include the development of efficient quantum cryptographic protocols and ethical considerations surrounding the deployment of quantum technologies. This study contributes to the discourse on securing national interests in the face of advancing quantum computing capabilities. Keywords: Quantum Cryptography, Digital Security, Post-Quantum Cryptography, Quantum Key Distribution.
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Dhakne, Dr Amol, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti e Shashank Singh. "Neural Network Based Message Concealment Scheme". International Journal for Research in Applied Science and Engineering Technology 10, n. 5 (31 maggio 2022): 1368–78. http://dx.doi.org/10.22214/ijraset.2022.42522.

Testo completo
Abstract (sommario):
Abstract: Neural Cryptography is a new thread that integrates cryptography and neural networks for cryptanalysis and encryption applications. We show that Neural Networks can execute symmetric encryption in an adversarial context in this paper, and we build on the existing literature on the subject. Cryptography's purpose is to make it difficult to decipher a cypher and recreate the plain text without the associated key. Your messages are encrypted with excellent cryptography in such a way that brute force attacks against the algorithm or key are nearly impossible. Good cryptography is secure because it employs extremely long keys and encryption techniques that are resistant to various types of attack. The neural net application is the next step in the evolution of good cryptography. This paper discusses the use of neural networks in cryptography, including how to create neural networks that can be utilized in cryptography. Keywords: Cryptography key, encryption system, encryption algorithm, artificial neural network,chaos maps, logistic encryption.
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede e Adebimpe Bolatito Ige. "Blockchain and quantum cryptography: Future of secure telecommunications in banking". Engineering Science & Technology Journal 3, n. 2 (30 dicembre 2022): 154–71. http://dx.doi.org/10.51594/estj.v3i2.1523.

Testo completo
Abstract (sommario):
The rapid evolution of telecommunications in the banking sector has necessitated advanced security measures to protect sensitive financial data and transactions. Blockchain technology, with its decentralized and immutable ledger system, has emerged as a promising solution for ensuring transparency, traceability, and security in banking communications. However, the potential threat posed by quantum computing to current cryptographic methods presents new challenges to the integrity of blockchain systems. Quantum cryptography, leveraging the principles of quantum mechanics, offers a robust alternative to traditional encryption techniques by enabling secure key distribution that is theoretically immune to quantum attacks. This abstract explores the convergence of blockchain and quantum cryptography as a dual framework for securing telecommunications in banking. The integration of blockchain's decentralized architecture with quantum cryptography's advanced encryption capabilities can significantly enhance the security of financial transactions, safeguarding against both current and future cyber threats. The paper also discusses the potential challenges in implementing these technologies, including the need for quantum-resistant algorithms, the high cost of quantum infrastructure, and the technical complexities associated with merging blockchain with quantum systems. In conclusion, while blockchain and quantum cryptography individually offer significant advancements in cybersecurity, their combined application represents the future of secure telecommunications in banking. As quantum computing continues to advance, the adoption of quantum cryptography alongside blockchain will be crucial in maintaining the security and integrity of banking communications. This paper argues for the importance of continued research and development in this area, highlighting the need for cross-disciplinary collaboration to overcome existing barriers and fully realize the potential of these technologies in securing the future of banking telecommunications. Keywords: Blockchain, Quantum Cryptography, Future, Secure Telecommunication, Banking.
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Priya, R. Shanmuga, e A. Senthilkumar. "A Study on Visual Cryptography for Colour Images". International Journal of Advanced Research in Computer Science and Software Engineering 7, n. 7 (1 agosto 2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.

Testo completo
Abstract (sommario):
The intent of this paper is to present some of the major things about visual cryptography for colour images. The idea behind this technique is quite simple and powerful. Visual cryptography deals with visual information like picture, printed text and written notes etc. Visual cryptography also called secret sharing. As the name implies visual cryptography which has a single secret image and more than one shadow images and provided for numerous users. Visual cryptography process depends on various measures such as accuracy, computational complexity, pixel expansion, contrast whether generated it is meaningless or meaningful. Encryption performed by image processing techniques and the decryption carried out by human visual system with the stacking images. Visual cryptography need not require any complicated cryptographic proficiency. So, the intruders or hackers get hard to hack the details programmatically. However, this papers deals with visual cryptography for colour images.
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Kaushal, Milind. "Cryptography: A Brief Review". International Journal for Research in Applied Science and Engineering Technology 10, n. 2 (28 febbraio 2022): 763–67. http://dx.doi.org/10.22214/ijraset.2022.40401.

Testo completo
Abstract (sommario):
Abstract: This paper reviews the concept of cryptography and some of the cryptographic algorithms. It discusses the importance of cryptography and how it is useful in the data security world. The history of this concept goes way back and has found uses in the times of wars. It has become way more advanced and complicated than it used to be but is still not perfect. Keywords: Cryptography, Asymmetric Cryptosystem, Cipher text, Encryption Algorithm, Diffie-Hellman, DES, 3DES
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Wang, Xing, Qiang Zhang e Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing". Applied Mechanics and Materials 20-23 (gennaio 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.

Testo completo
Abstract (sommario):
AES is one of the most widely used cryptographic systems. DNA computing has the high efficiency to solve some NP-problems. Therefore many scientists try to combine DNA computing with cryptography. In this paper, an algorithm is designed to simulate a plaintext encrypted by DNA biotechnology and modern cryptography. After mapping the plaintext information as DNA chain and handling the base chain with biological genetic technology, we can get the gene codes form, then using the Rijndael algorithm to deal with the biological chain with cryptography and get the final result. It makes the DNA-based cryptography more effective and more security.
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Sankhyan, Bhanu. "Review on Symmetric and Asymmetric Cryptography". International Journal for Research in Applied Science and Engineering Technology 12, n. 3 (31 marzo 2024): 2934–40. http://dx.doi.org/10.22214/ijraset.2024.59538.

Testo completo
Abstract (sommario):
Abstract: As the technology is progressing, internet is growing day by day and it has became more vulnerable than ever. To prevent data from being tampered or viewed by third parties, cryptography is used. Cryptography has it’s roots from ancient egypt, where secret writings are developed to transfer messages. Now, modern cryptography is used to secure data over the network, which are classified into symmetric and asymmetric cryptography. Both cryptographic methods has it’s own limitations and advantages, which are further used to develop algorithms for better security. More and more efficient algorithms are developed which are discussed in this paper
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Abbasi, Faisal. "Quantum Cryptography: The Future of Internet and Security Management". Journal of Management and Service Science (JMSS) 1, n. 1 (2021): 1–12. http://dx.doi.org/10.54060/jmss/001.01.004.

Testo completo
Abstract (sommario):
In today’s world, cryptography techniques are used and implemented on the elementary method of finding the prime factor of large integer, which is said to be “Inevitable to Track”. But living in an era where nothing is impossible to achieve, so cryptographic techniques are exposed to both technologies’ advancement in computational power of machines and advancement in the fields of mathematics to break the notion that factoring of large integers into their prime is impossible. To cope up with the threat that cryptography will face is handled by fusion of physics into cryptography, leading to the evolution of Quantum Cryptography. It is one of the fast-growing fields in computer technology. In this paper, I am going to brief the concepts of Quantum Cryptography and how this technology has led to the development of the strategy of complete secure key distribution. The paper covers the loophole present in the modern cryptography techniques, the fundamental principle of quantum cryptography, its implementation in the real world along with the limitation faced in this field, and the possible future of quantum cryptography.
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Bharati A. Patil, Prajakta R. Toke e Sharyu S. Naiknavare. "Research on Various Cryptography Techniques". International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, n. 2 (22 aprile 2024): 685–92. http://dx.doi.org/10.32628/cseit2410290.

Testo completo
Abstract (sommario):
Cryptography is utilized to make secure data transmission over networks. The algorithm called for cryptography should meet the conditions of authentication, confidentiality, integrity and non-repudiation. Cryptography is a technique used from decenniums to secure and forfend the information and send the data from one place to another without the trepidation of having been read out by some unauthorized and unauthenticated denotes. Several ways has been developed in this field to make the information more secure and evade trespassing. However these methods may have some loopholes or shortcoming which leads to the leakage of information and thus raising a question of information security. The cryptographic technique is utilized not only to provide the security but additionally it deals with data integrity, confidentiality and non-repudiation issues. To safeguard data during transmission or storage, sundry algorithms and methods have been developed in the field of security. A wide range of cryptography approaches are employed, each with its own set of strengths and inhibitions that are acclimated to provide data security. Cryptography can be defined as techniques that cipher data, depending on categorical algorithms that make the data unreadable to the human ocular perceiver unless decrypted by algorithms that are predefined by the sender. It encrypts data utilizing a set of algorithms such as symmetric and asymmetric algorithms. These encryption methods vary in terms of vitality, celerity, and utilization of resources (CPU utilization, recollection, and power). It is utilized to bulwark personal identifiable information (PII) and other confidential data, authenticate identities, avert document tampering, and build trust between servers. Cryptography is one of the most paramount techniques utilized by digital businesses to safeguard the systems that store their most valuable asset – data – whether it is at rest or in kinetic Customer PII, employee PII, perspicacious property, company strategies, and any other confidential information are examples of data. As a result, cryptography is a vital infrastructure, as the aegis of sensitive data increasingly relies on cryptographic solutions. In this paper I have discussed various cryptographic techniques and the inhibitions of those techniques as well. Some cryptographic algorithms are briefly described and their impact on the information is additionally mentioned.
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Geetha, M., e K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS". IJISCS (International Journal of Information System and Computer Science) 2, n. 3 (14 marzo 2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.

Testo completo
Abstract (sommario):
With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios.AbstractWith the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios. Keywords:Cryptography; Encryption; Decryption; Key Management; Optimization algorithm;
Gli stili APA, Harvard, Vancouver, ISO e altri
38

B S, Aditya, e Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security". International Journal for Research in Applied Science and Engineering Technology 10, n. 7 (31 luglio 2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.

Testo completo
Abstract (sommario):
Abstract: With technological advancements along with tremendous generation and storage of sensitive data, which can be cryptographic keys, passwords or other data that can be crucial for operation of an organization, thereis a need to secure this sensitive data startingfrom its creation, its transfer from one place to another and its final place of storage. Thiscan be done with the help of cryptography and cryptographic algorithms that can help secure this entire process. With cryptography, it is possible to securely transfer sensitive data to ensure that it cannot be read or tampered by a third party. Cryptography and its related algorithms can also be used to secure the network for safe transfer and storage of sensitive data. In this paper, starting with a brief introduction to cryptography concepts and some networkingprotocols, we shall discuss and compare usage of an algorithm such as AES, hashing and importance of Digital Certificates and Signing operation along with encryption for better security.
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Sabaya, Dinaeli Paul, Adam Aloyce Semlambo e Joel Kazoba Simon. "Data Security Through Crypto-Stegano Systems". International Journal of Computational Science, Information Technology and Control Engineering 10, n. 1/2/3 (27 luglio 2023): 1–23. http://dx.doi.org/10.5121/ijcsitce.2023.10301.

Testo completo
Abstract (sommario):
Unauthorized access and hacking are major issues for internet users, and numerous articles have been published on various approaches to solving this issue. This study proposes a novel method for encoding a hidden message within the text by combining text steganography and substitution cryptography. While steganography and cryptography can be used to protect data, neither is sufficient to provide better security as they can be broken by steganalysis and cryptoanalysis. Therefore, the terms "cryptography-stegano" should be combined for improved security. In this method, data is first encrypted using a substitution cryptography technique to produce the cypher text, which is then encrypted using text steganography to produce a more secure cypher text sent to the recipient. Contrary to popular belief, using image steganography and cryptographic methods is unnecessary for effective data encryption. The study shows that combining text steganography with cryptographic techniques is an excellent data security method. Additionally, other combinations, such as audio and video steganography, should also be considered for better security
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Nana, Nana, e Puguh Wahyu Prasetyo. "An implementation of Hill cipher and 3x3x3 rubik's cube to enhance communication security". Bulletin of Applied Mathematics and Mathematics Education 1, n. 2 (10 dicembre 2021): 75–92. http://dx.doi.org/10.12928/bamme.v1i2.4252.

Testo completo
Abstract (sommario):
Message security is must be managed seriously. Therefore, to maintain the confidentiality of any message, cryptography is needed. Cryptography is a science that uses mathematics to encrypt and decrypt messages. Cryptography is used as a tool to protect messages, for example, national secrets and strategies. The method of this research is qualitative research with a literature review. This research implements a hybrid cryptographic algorithm by combining Hill cipher and 3x3x3 Rubik's cube methods with Python software simulation.
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Rani, Rashmi. "Quantum Cryptography: Fundamentals and Advanced Techniques". International Journal for Research in Applied Science and Engineering Technology 12, n. 5 (31 maggio 2024): 5747–51. http://dx.doi.org/10.22214/ijraset.2024.62943.

Testo completo
Abstract (sommario):
Abstract: Quantum-cryptography represents a revolutionary advancement in the field of secure correspondence, leveraging the principles of quantum-mechanics to ensure unprecedented levels of security. This review paper provides a comprehensive exploration of both the foundational principles and advanced techniques underpinning quantum cryptographic systems. We begin by examining the theoretical foundations, including quantum key distribution (QKD) protocols such as BB84 and E91, and the critical role of entanglement and superposition in these processes. The paper then delves into the latest advancements and techniques in the field, including device-independent QKD, quantum cryptographic networks, and post-quantum cryptographic methods designed to be resilient against quantum computer attacks. Additionally, we discuss practical implementation challenges and the current state of experimental quantum cryptography. By synthesizing recent research findings and technological developments, this review aims to provide a thorough comprehension of the current environment and future directions of quantum cryptography, highlighting its potential to revolutionize secure communications in the quantum era
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Vignesh, R. Sakthi, S. Sudharssun e K. J. Jegadish kumar. "Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography". International Journal of Computer Applications 1, n. 26 (25 febbraio 2010): 59–64. http://dx.doi.org/10.5120/479-786.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Lohith D K e Sanjay M. "A system of symmetric key cryptography using deep learning". Global Journal of Engineering and Technology Advances 20, n. 2 (30 agosto 2024): 081–89. http://dx.doi.org/10.30574/gjeta.2024.20.2.0139.

Testo completo
Abstract (sommario):
Encryption is the process of making data unreadable, whereas decryption is the process of recovering the original data. Good cryptography encrypts data in a way that makes it impossible to conduct a brute force assault on the key or a cryptography method. Many ciphers have been proposed up to this point. But their weaknesses have also been made public. Novel cryptography techniques are therefore quite desirable. Within the suggested project, a symmetric A deep neural network-based cryptography algorithm is created. Our experiments demonstrate that the suggested approach outperforms conventional cryptographic methods and is very difficult to crack, especially when little text files are involved.
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Viresh, Kasheenath Babaleshwar, Karade Sinchana, N. Sakshi e Naidu Anush. "Audio encryption and decryption using AES algorithm technique". i-manager’s Journal on Electronics Engineering 14, n. 2 (2024): 8. http://dx.doi.org/10.26634/jele.14.2.20486.

Testo completo
Abstract (sommario):
Audio cryptography is the practice of encrypting audio data to prevent illegal access to and listening to it. This paper presents an innovative technique of audio cryptography based on the Python computer language. To ensure secrecy and integrity, the suggested system encrypts and decrypts audio signals using advanced cryptographic techniques. A crucial component of AES, the cryptographic key is dynamically created to improve security. Python's broad library support and ease of use make it an ideal platform for implementing the AES algorithm, which ensures dependable and effective audio data encryption. The system utilizes Python's cryptography library for seamless integration and ease of implementation. Simulation results demonstrate the efficacy of the AES algorithm in securely encrypting and decrypting audio data with reduced noise compared to traditional methods.
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Drzazga, Bartosz, e Łukasz Krzywiecki. "Review of Chosen Isogeny-Based Cryptographic Schemes". Cryptography 6, n. 2 (31 maggio 2022): 27. http://dx.doi.org/10.3390/cryptography6020027.

Testo completo
Abstract (sommario):
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can break the bedrock of most currently used systems, i.e., the RSA problem and discrete logarithm problem. Post-quantum cryptography can withstand attacks carried out by quantum computers. Several families of post-quantum systems exist; one of them is isogeny-based cryptography. As a main contribution, in this paper, we provide a survey of chosen, fundamental isogeny-based schemes. The target audience of this review is researchers interested in practical aspects of this field of cryptography; therefore the survey contains exemplary implementations. Our goal was not to develop an efficient implementation, but to provide materials that make it easier to analyze isogeny-based cryptography.
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Irawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP". JURNAL TEKNOLOGI INFORMASI 1, n. 1 (1 giugno 2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.

Testo completo
Abstract (sommario):
Abstract - This research was conducted to create a cryptographic implementation of vigenere ciphers. This system is designed by analyzing the descriptive method, and the comparative method. After analysis, modeling is done with UML (Unified Modeling Language) and the design of vigenere cipher cryptography system with text encryption and decryption can be programmed using PHP software. The results of this study are an implementation of the vigenere cipher cryptographic system with PHP. Keywords - Cryptography, Vigenere Cipher, Encryption - Decryption, Text, PHP.
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Yalla, Surya Prakash, Archana Uriti, Abhisek Sethy e Sathishkumar V. E. "Secure method of communication using Quantum Key Distribution". Applied and Computational Engineering 30, n. 1 (22 gennaio 2024): 32–37. http://dx.doi.org/10.54254/2755-2721/30/20230065.

Testo completo
Abstract (sommario):
Secure communication plays a vital role now-a-days. Modern-day secure communication is made possible via cryptography. Modern cryptographic algorithms are based on the process of factoring large integers into their primes, as they are intractable. But the cryptography nowadays is vulnerable to technological advances in computing power like quantum computing and evolution in math to quickly reverse one-way functions like factorization of large integers. Incorporating quantum physics concepts into cryptography is the answer, which results in an assessment of quantum cryptography. A unique type of cryptography known as quantum cryptography makes advantage of quantum mechanics to provide complete protection against the transmitted message. Quantum Key Distribution (QKD), a random binary key distribution used in quantum cryptography, enables communication participants to recognize unauthorized listeners. Quantum Key Distribution (QKD) is likely the most advanced quantum technology currently accessible with full stack systems already in use. This projects goal is to develop secure and encrypted communication between the parties with the help of a web application using the BB84 protocol.
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Tama, Yanuar Bhakti Wira, e Muhammad Firdhausi Fahmi. "Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery". Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi 11, n. 2 (16 dicembre 2023): 361–71. http://dx.doi.org/10.37905/euler.v11i2.23009.

Testo completo
Abstract (sommario):
Elliptic curve cryptography is one of the application fields of algebra and number theory concepts. One form of elliptic curve cryptography is Montgomery elliptic curve cryptography. In this paper, a method for a classical cryptographic system be formulated, consisting of encryption and decryption involving twenty-six alphabetical letters which are mapped to points on an elliptic curve by utilizing the order of the point group on the Montgomery elliptic curve. Several examples of implementation in simple cases are given to verify the results.
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Liang, Yuheng. "A research on applications of neural network-based cryptography". Applied and Computational Engineering 14, n. 1 (23 ottobre 2023): 258–64. http://dx.doi.org/10.54254/2755-2721/14/20230798.

Testo completo
Abstract (sommario):
With the rapid development of neural networks, they have been integrated into more and more fields, and cryptography is no exception. Research on the combination of neural networks and cryptography is developing rapidly, and numerous scholars have made significant progress in these fields. Neural network-based cryptography is a complex system that deserves an in-depth study. This paper will first introduce the foundation types of neural networks, some of the other types of neural network , and cryptographic techniques. Immediately after, this paper will introduce the scheme of Generative Adversarial Neural Networks (GANs) generating cryptography and the scheme of combining GANs and Convolutional Neural Networks (CNNs) generating cryptography and analyze their differences and advantage and disadvantages. This paper will then introduce the application of neural networks in blockchain, key exchange technology, and the combination of neural networks and Advanced Encryption Standard (AES). As well as at the end of this paper will show some views of combining neural networks and cryptography in the future.
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Darko, Cyprian Danso. "Data Security in the Cloud Using Multi-Modal Bio-Cryptographic Authentication". Advances in Multidisciplinary and scientific Research Journal Publication 10, n. 4 (30 novembre 2022): 9–14. http://dx.doi.org/10.22624/aims/digital/v10n4p2.

Testo completo
Abstract (sommario):
Bio Cryptography have been used to secure and protect systems for decades and a further development to employing multi modal bio cryptographic authentication in cloud security has become the best of practice to avert the problems associated with single-phased bio cryptographic techniques. Cloud security have seen improvements over time and higher data security can be achieved by using Multimodal bio cryptographic technique for data encryption and decryption to prevent the intruders from accessing the data. Application of one of the best algorithm-Bluefish to encrypt and decrypt data in the cloud. Keywords: Bi- Cryptography, Data Decryption, Data Encryption, Cloud Security, Biometrics
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia