COMMENTS

  1. (PDF) A Review Paper on Cryptography

    a target that never stops moving. Algorithm ic and mathematic. aspects, such as hashing techniques and enc ryption, are the. main focus of security courses. As crackers find ways to hack. network ...

  2. A New Approach of Cryptography for Data Encryption and Decryption

    Cryptography is the solution to secure data from different security risks. To enhance the security of communication systems better cryptosystems technology is obvious in the area of cryptography. Our research focuses on data encryption and decryption technique for a better cryptosystem; where we have proposed a new approach that ensures better ...

  3. (PDF) Cryptography Algorithms: A Review

    The algorithms which come under the symmetric key cryptography are DES, TDES, AES, and RC4. 2) Asymmetric key cryptography: Public Key cryptography two key crypto systems, one key is to encrypt ...

  4. Cryptography Algorithms for Enhancing IoT Security

    Data security is represented by cryptography, an essential tool (algorithms) in security, which is why many researchers are developing cryptographic algorithms to improve the Security of IoT. This survey paper introduced an overview of IoT technology, architecture, and applications and a detailed analysis comparing all cryptographic algorithms ...

  5. A review on various cryptographic techniques & algorithms

    Cryptography is a tool to execute messages confidentiality. In Greek, the word "composing mystery" has a special meaning. The working cycle that changes through the actual message is called in plaintext as cypher text. The conversation loop, called scrambling, restores plaintext from the chip text [1] .

  6. (PDF) A REVIEW PAPER ON CRYPTOGRAPHY ALGORITHMS

    A REVIEW PAPER ON CRYPT OGRAPHY ALGORITHMS. Jitendrakumar P. Radadiya, Research Scholar, Department of Statistics, Saurashtra University, Rajkot. Dr. Haresh B. Tank, Associate Professor, Lt ...

  7. Cryptography: Recent research trends of encrypting mathematics

    Cryptography is the study of assured communication procedure which allows only the sender and the intended person to review the message and the content shared. The simplest method used is the symmetric algorithm in which once the message is encrypted it is sent to the recipient along with its secret key. 2.

  8. Critical Analysis of Cryptographic Algorithms

    This paper presents a critical analysis of these systems based on a detailed study and literature review of some cryptography algorithms. Published in: 2020 8th International Symposium on Digital Forensics and Security (ISDFS) Article #: Date of Conference: 01-02 June 2020. Date Added to IEEE Xplore: 15 June 2020. ISBN Information:

  9. Post Quantum Cryptography: Techniques, Challenges, Standardization, and

    ing di erent future directions in which research is being done. 2 Cryptography Cryptography is the science of concealing messages using mathematics. The message is disguised using a crypto-graphic encryption algorithm to hide the substance of the message. The disguised data is also known as the ciphertext. The message is known as plaintext or ...

  10. PDF Comparative Study and Analysis of Various Cryptographic Algorithms

    cryptography is in the key. It is used for both encryption and decryption process. Key could be a number, function or an algorithm. Key performs the transformation [11]. F. Cryptosystem . The system which is used to implement cryptography is known as cryptosystem. III. ALGORITHMS USED . A. Advanced encryption standard (AES) AES was developed in ...

  11. Research and implementation of RSA algorithm for encryption and

    Cryptographic technique is one of the principal means to protect information security. Not only has it to ensure the information confidential, but also provides digital signature, authentication, secret sub-storage, system security and other functions. Therefore, the encryption and decryption solution can ensure the confidentiality of the information, as well as the integrity of information ...

  12. Post-Quantum and Code-Based Cryptography—Some Prospective Research

    Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on modular arithmetic to the contemporary cryptosystems based on quantum computing. The emergence of quantum computing poses a major threat to the ...

  13. (PDF) A Survey on Cryptography Algorithms

    decryption of data in all fields, to make a comparative study for most import ant algorithms in terms of data security. effectiveness, key size, complexity and time, etc. This research focused on ...

  14. A systematic review of homomorphic encryption and its ...

    A review of research papers based on these criteria is also conducted. Lattice based cryptography. Learning with errors (LWE/RLWE) Integer based. NTRU. ... (LWE) is a key concept that serves as a building block of advanced cryptographic algorithms. LWE is a generalization of LPN (Learning parity with noise) problem. LWE can be thought of as two ...

  15. Cryptography Primer: Introduction to Cryptographic Principles and

    A PRBG is an algorithm which uses a small truly random bit sequence, known as the seed, to generate a binary sequence of a signifi -cantly larger length, which appears to be random. There are several practical ways to construct a PRBG based on other cryptographic primitives such as hash functions and block ciphers.

  16. Implementation and Performance Analysis of Hybrid Cryptographic Schemes

    In our research, we have proposed a comparative study for two-tier versus three-tier hybrid cryptographic models applied to secure data on the cloud. ... we have summarized the basic attributes of the most common ciphers. Table 1. Characteristics of the common cryptographic algorithms Cipher Keys Size (Bits) Iterations Block size (Bits) DES 56 ...

  17. [2202.02826] Post Quantum Cryptography: Techniques, Challenges

    The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. The security of asymmetric algorithms like RSA, Diffie Hellman, and ECC is based ...

  18. Quantum-Safe Cryptography Algorithms and Approaches

    One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum computers are able to compute at full speed. ... Dr. Satya Prakash Yadav has published two patents and authored many research papers in web of science indexed journals. Additionally, he has presented research papers at many ...

  19. Post-Quantum Secure UE-to-UE Communications

    The rapid development of quantum computing poses a significant threat to the security of current cryptographic systems, including those used in User Equipment (UE) for mobile communications. Conventional cryptographic algorithms such as Rivest-Shamir-Adleman (RSA) and Elliptic curve cryptography (ECC) are vulnerable to quantum computing attacks, which could jeopardize the confidentiality ...

  20. A Review Paper on Cryptography

    A Review Paper on Cryptography Abstract: With the internet having reached a level that merges with our lives, growing explosively during the last several decades, data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification ...

  21. An Overview of Data Security Algorithms in Cloud Computing

    In this paper, existing cryptographic algorithms that are used to encrypt the cloud data are discussed. Cryptography means protecting data or information from unauthorized users by encoding the data or information into an illegible format; It is the process of converting a plaintext (original text) into a ciphertext (converted text) and vice versa.

  22. Research on AGV Path Planning Integrating an Improved A* Algorithm and

    Finally, the two improved algorithms are combined into a new fusion algorithm. The experimental results show that the search efficiency of the fusion algorithm significantly improved and the transportation time shortened. The path smoothness significantly improved, and the closest distance to obstacles increased, reducing the risk of collision.

  23. (PDF) Network Security and Cryptography Challenges and ...

    Abstract -- The primary goal is to present a comprehensive overview of network security, cryptography, and digital signatures. Cryptography and network security should be narrower to include ...

  24. Elliptic Curve Cryptography; Applications, challenges, recent advances

    Compared to integer factorization and discrete logarithm structures, the algorithms established in the papers [13], [14] have shown ECC efficient performance. The EC-based signature scheme is a convenient signature scheme for decreasing the size of messages with the additional bonus of message recovery.

  25. A Semi-Supervised Lie Detection Algorithm Based on Integrating ...

    To address this, this paper proposes a semi-supervised lie detection algorithm based on integrating multiple speech emotional features. Firstly, Long Short-Term Memory (LSTM) and Auto Encoder (AE) network process log Mel spectrogram features and acoustic statistical features, respectively, to capture the contextual links between similar features.

  26. An Exploration to the Quantum Cryptography Technology

    The aim of this paper is to explore the knowledge related to the Quantum Cryptography, Quantum Key Distribution; and their elements, implementation, and the latest research. Moreover, exploration of the loopholes and the security of Internet of Things (IoT) infrastructure and current used classical cryptographic algorithms are described in the ...

  27. NIST Releases First 3 Finalized Post-Quantum Encryption Standards

    GAITHERSBURG, Md. — The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer.. Researchers around the world are racing to build quantum computers that would operate in radically different ways from ordinary computers and could break the current ...

  28. (PDF) RSA Public Key Cryptography Algorithm

    This paper aims to review RSA, examine its strengths and weaknesses, and propose novel solutions to overcome the weakness. RSA (Rivest, Shamir, and Adleman) is one of the best cryptographic ...

  29. Toward a code-breaking quantum computer

    The paper's lead author is Seyoon Ragavan, a graduate student in the MIT Department of Electrical Engineering and Computer Science. The research will be presented at the 2024 International Cryptology Conference. Cracking cryptography

  30. Journal of Medical Internet Research

    Results: In stage 1, our literature search returned 127 papers, with 60 meeting the criteria for a full review and only 3 papers highlighting sex differences in algorithm performance. In the papers that reported sex, there was a consistent underrepresentation of female patients in the data sets. No papers investigated racial or ethnic differences.