To see the other types of publications on this topic, follow the link: Cryptographic protection methods.

Journal articles on the topic 'Cryptographic protection methods'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cryptographic protection methods.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zolotareva, Irina, and Irina Gorodinskaya. "CRYPTOGRAPHIC METHODS OF INFORMATION PROTECTION." Science & World 2022, no. 1 (2022): 1–5. http://dx.doi.org/10.26526/2307-9401-2022-1-1-5.

Full text
Abstract:
The article discusses the methods of cryptographic protection of information. Methods of cryptographic protection of information are special methods of encryption, encoding or other transformation of information that make its contents inaccessible without presenting the cryptogram key and reverse transformation. Cryptographic protection is undoubtedly the most reliable method of protection, since the information itself is protected directly and there is no access to it.
APA, Harvard, Vancouver, ISO, and other styles
2

Khamalwa, Mulemi Simiyu. "Exploring how Commutative Algebra Underpins Cryptographic Protocols and Encryption Methods Used in Secure Communications and Data Protection." NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 5, no. 3 (2024): 58–62. http://dx.doi.org/10.59298/nijses/2024/10.5.586237.

Full text
Abstract:
In the dynamic realm of cybersecurity, the principles of cryptography form the bedrock of secure communication and data protection. This review delves into the pivotal role of commutative algebra in the development and implementation of cryptographic protocols. Commutative algebra, encompassing commutative rings, fields, and groups, is integral to many encryption and decryption algorithms that safeguard digital information. This review explores various algebraic structures, including modular arithmetic, finite fields, and group theory, highlighting their significance in key cryptographic proce
APA, Harvard, Vancouver, ISO, and other styles
3

Ibrokhimov, Nodirbek Ikromjonovich, and Fayozbek Fazliddin oglu Olimov. "METHODS AND MEANS OF INFORMATION PROTECTION." Research and implementation 2, no. 5 (2024): 186–93. https://doi.org/10.5281/zenodo.11485883.

Full text
Abstract:
This article explores complex approaches to information protection, focusing on organizational and technical methods, as well as cryptographic methods. Organizational and technical practices include policies, procedures, and technologies designed to mitigate risks and ensure the integrity, confidentiality, and availability of data. In addition, cryptography studies mathematical algorithms and protocols that protect data by encrypting it and ensuring that only authorized individuals have access to confidential information. Combining these strategies, the paper highlights the multifaceted nature
APA, Harvard, Vancouver, ISO, and other styles
4

Ms., Kummasani Vinodhini. "Artifical Intelligence in Cryptography: Protection of Cryptographic System under Patents." Annual International Journal on Analysis of Contemporary Legal Affairs (AIJACLA) 5 (May 25, 2025): 95–111. https://doi.org/10.5281/zenodo.15514117.

Full text
Abstract:
<em>Artificial Intelligence (AI) is transforming cryptographic approaches to encryption techniques, automating key generation, and strengthening safety mechanisms against cyber threats. Possible applications include strengthening data protection, detecting vulnerabilities, and optimizing cryptographic protocols. In particular, AI-based cryptographic models enhance the non- disable for security systems against advanced assaults, including those posed by quantum computing. Cryptography leverages AI through machine learning algorithms for anomaly detection, AI-based key management, and neural net
APA, Harvard, Vancouver, ISO, and other styles
5

Victor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat, and Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection." E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.

Full text
Abstract:
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the threats posed by bad actors. This abstract examines the evolution of secure communication protocols and data protection techniques as it relates to the advancements in cryptography. The development of post-quantum cryptography is the most notable development in cryptography discussed in this study. As quantum computers become more powerful, they po
APA, Harvard, Vancouver, ISO, and other styles
6

Okhrimenko, Tetiana, Serhii Dorozhynskyi, and Bohdan Horbakha. "ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS." Computer systems and information technologies, no. 1 (March 30, 2023): 62–67. http://dx.doi.org/10.31891/csit-2023-1-8.

Full text
Abstract:
The development of modern computer technologies endangers the confidentiality of information, which is usually ensured by traditional cryptographic means. This circumstance forces us to look for new methods of protection. In view of modern trends, quantum cryptography methods can become such alternatives, which allow solving a number of important cryptographic problems, for which the impossibility of solving using only classical (that is, non-quantum) communication has been proven. Quantum cryptography is a branch of quantum informatics that studies methods of protecting information by using q
APA, Harvard, Vancouver, ISO, and other styles
7

Овчаренко, А. А. "Cryptographic methods to protect personal data in financial transactions." Modern Economy Success, no. 3 (March 27, 2024): 246–49. http://dx.doi.org/10.58224/2500-3747-2024-3-246-249.

Full text
Abstract:
цель рассмотреть актуальные проблема обеспечения экономической безопасности через применение криптографических методов защиты личных данных в финансовых транзакциях. Проанализировать современные способы защиты конфиденциальности и целостности данных в цифровой экономике, освещая последние тенденции и инновационные подходы в финансовой криптографии. Внимание уделяется анализу и внедрению эффективных криптографических алгоритмов и протоколов, способных обеспечить безопасное шифрование и аутентификацию данных, а также защиту от несанкционированного доступа и атак. В работе представлены примеры ус
APA, Harvard, Vancouver, ISO, and other styles
8

Belikova, Ksenia Michailovna. "The role of cryptography in ensuring cybersecurity and protecting information about technologies of strategic and advanced development in the context of protection of sci-tech achievements in the BRICS countries." Юридические исследования, no. 9 (September 2021): 22–62. http://dx.doi.org/10.25136/2409-7136.2021.9.36508.

Full text
Abstract:
The subject of this research is the role of cryptography in ensuring cybersecurity and protecting information about technologies of strategic and advanced development in the context of protection of sci-tech achievements in the BRICS countries. The relevance of the selected topic is substantiated by the fact that modern countries, for example, the founder of computer industry &amp;ndash; the United States along with the BRICS member-states, realize the importance and practical significance of cryptography in different spheres (military, civil) and aim to develop the means and systems of inform
APA, Harvard, Vancouver, ISO, and other styles
9

Metelkov, A. "About cryptographic information protection measures in the implementation of information technology in the solution of management problems in the social and economic systems." National Security and Strategic Planning 2020, no. 4 (2021): 68–78. http://dx.doi.org/10.37468/2307-1400-2021-2020-4-68-78.

Full text
Abstract:
In theory and in practice, there is uncertainty in the existence of measures for cryptographic protection of information due to the fuzzy legal regulation of the classification of information protection measures associated with the use of cryptographic methods and encryption (cryptographic) information protection tools to ensure the security of data automatically processed in information systems. Cryptographic methods are widely used not only to protect information from unauthorized access, but also as the basis for a number of modern information technologies. The author proposed to introduce
APA, Harvard, Vancouver, ISO, and other styles
10

Issagalyeva, Z. А., A. S. Abdiraman, N. K. Medelbayeva, L. S. Aldasheva, and A. Zh Alibek. "Comparative analysis of cryptographic methods of information protection." BULLETIN of the L.N. Gumilyov Eurasian National University. Technical Science and Technology Series 148, no. 3 (2024): 176–88. http://dx.doi.org/10.32523/2616-7263-2024-148-3-176-188.

Full text
Abstract:
This article is devoted to the study of methods for analyzing the cryptographic stability of encryption algorithms. The rapid development of encryption systems, as well as the concomitant development of their hacking, leads to the emergence of new systems with high cryptographic strength. During the work, popular encryption methods were studied according to various parameters (performance, memory size, resistance to damage, etc.), based on the results of the study, the DES and AES algorithms were selected, and its algorithm was modeled using the Cryptool 2 software product, as well as attack b
APA, Harvard, Vancouver, ISO, and other styles
11

Sinha, Arsh. "Secure Multimedia Content Distribution using Blockchain and Cryptographic Methods." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42012.

Full text
Abstract:
Digital content distribution faces security challenges like unauthorized access, piracy, and cyber threats, risking intellectual property and data integrity. Our project integrates fa- cial recognition (MTCNN, InceptionResnetV1), AES encryption, IPFS for decentralized storage, and blockchain logging to ensure secure file management. Using Python, TensorFlow, PyTorch, Cryptography Library, Tkinter, and Hyperledger/Ethereum, it enables tamper-proof tracking, efficient encryption, and seamless retrieval. The system enhances security with biometric authen- tication, cryptographic protection, and d
APA, Harvard, Vancouver, ISO, and other styles
12

BERESTNEV, MIKHAIL, ALEXEY MINBALEEV, and KIRILL EVSIKOV. "ENSURING INFORMATION SECURITY OF MINING EQUIPMENT IN THE QUANTUM ERA." News of the Tula state university. Sciences of Earth 1, no. 1 (2023): 567–84. http://dx.doi.org/10.46689/2218-5194-2023-1-1-567-584.

Full text
Abstract:
The article considers the expediency of changing the methods of ensuring information security of automated process control systems (automated process control systems) of extractive industry enterprises. The analysis of foreign experience allowed us to say that the world's leading economies are preparing for the appearance of a cryptographically relevant quantum computer. Many countries have adopted mandatory and recommendatory documents on the transfer of critical information infrastructure to quantum-secure methods of information protection: quantum key distribution or post-quantum cryptograp
APA, Harvard, Vancouver, ISO, and other styles
13

N Keerthi Reddy, K Venkateswari, N Veeralahari, M Pavithra, and Dr. G Thippanna. "THE ROLE OF AI IN IMPROVINGENCRYPTION IN DATA PRIVACY: AHYPOTHETICAL APPROACH." international journal of engineering technology and management sciences 9, no. 2 (2025): 68–75. https://doi.org/10.46647/ijetms.2025.v09i02.012.

Full text
Abstract:
In the digital era, ensuring data privacy has become a paramount concern, particularly as cyberthreats continue to grow in complexity. Cryptography [1] plays a vital role in protecting sensitiveinformation, but traditional approaches are increasingly facing challenges in the face of evolvingattack strategies. Artificial Intelligence (AI) offers innovative solutions to enhance data privacywithin cryptographic systems. This abstract explores how AI can be leveraged to strengthencryptographic methods and address the challenges of data privacy. AI-based techniques, such asmachine learning algorith
APA, Harvard, Vancouver, ISO, and other styles
14

Sinicin, Alexey M. "PROTECTION METHODS AND CRYPTOGRAPHIC PROTOCOLS FOR EMBEDDED ELECTRONIC SYSTEMS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 9/6, no. 150 (2024): 12–23. http://dx.doi.org/10.36871/ek.up.p.r.2024.09.06.002.

Full text
Abstract:
The article is devoted to the study of protection techniques and cryptographic protocols designed for embedded electronic systems, which are key components in modern devices and infrastructures. The main security threats faced by these systems are reviewed, including attacks through third-party channels and physical access. The paper analyzes lightweight cryptographic protocols suitable for limited computational and energy resources, authentication methods, key management, and hardware and software security approaches. Examples of successful implementations are given and the effectiveness of d
APA, Harvard, Vancouver, ISO, and other styles
15

Lukichov, Vitalii, Yurii Baryshev, Natalia Kondratenko, and Vadym Malinovskyi. "METHOD OF THE ADAPTIVE MULTILAYER INFORMATION PROTECTION ON THE BASIS OF STEGANOGRAPHY AND CRYPTOGRAPHY." Information technology and computer engineering 58, no. 3 (2023): 4–11. http://dx.doi.org/10.31649/1999-9941-2023-58-3-4-11.

Full text
Abstract:
An analysis of known solutions to the problem of steganographic and cryptographic methods combining to achieve multilayer information protection is presented. Results of the analysis allowed us to identify trends and prospects for the development of these kink of methods. Based on the results of the analysis, the research task was determined concerning the adaptation of the used cryptographic and steganographic methods in order to achieve the best level of protection, which is needed at critical systems. Metrics were defined, those allowed to choose the best combination of cryptographic and st
APA, Harvard, Vancouver, ISO, and other styles
16

Eliseev, V. L. "QUANTUM CRYPTO ENCLAVE FOR IMPLEMENTING UNCOMPROMISED TRUSTED DATA CENTERS." Voprosy kiberbezopasnosti 3, no. 67 (2025): 99–104. https://doi.org/10.21681/2311-3456-2025-3-99-104.

Full text
Abstract:
Purpose of the study: development and justification of the architecture of a quantum-cryptographic system for protecting access to a data center with high requirements for the confidentiality of processed information belonging to various entities, using federated learning problem as the example. Methods of research: systems analysis. Result(s): the problem of ensuring the confidentiality of data belonging to different subjects during their joint processing is considered. The concept of a cryptoenclave is studied as an effective approach to implementing the task. An analysis of modern and prosp
APA, Harvard, Vancouver, ISO, and other styles
17

Yashika Gaidhani. "Privacy-Preserving Cryptographic Protocols Balancing Data Security and User Privacy in Modern Networks." Panamerican Mathematical Journal 35, no. 2s (2025): 651–66. https://doi.org/10.52783/pmj.v35.i2s.3129.

Full text
Abstract:
In this age of always-on connection, it is very important to keep data safe while also protecting user privacy. In today's networks, where data travels through many pathways, such as cloud services and IoT devices, cryptographic algorithms are very important for keeping private data safe. But it's still exceptionally difficult to create beyond any doubt that information is secure without putting people's protection at chance. This conversation goes into detail almost privacy-preserving security strategies, looking at their significance, issues, and other ways to solve them. The objective of pr
APA, Harvard, Vancouver, ISO, and other styles
18

K.L, Bajaj. "Exploring Number Theory: From Prime Numbers to Cryptographic Algorithms." Modern Dynamics: Mathematical Progressions 1, no. 3 (2024): 10–14. https://doi.org/10.36676/mdmp.v1.i3.36.

Full text
Abstract:
Number theory, a branch of pure mathematics devoted to the study of integers and integer-valued functions, has profound implications in various fields, particularly in cryptography. This paper delves into the intricate world of number theory, tracing its historical development and highlighting its pivotal role in modern cryptographic algorithms. We begin by exploring fundamental concepts such as prime numbers, greatest common divisors, and modular arithmetic, which form the bedrock of number theory. The significance of prime numbers is underscored by their application in key cryptographic meth
APA, Harvard, Vancouver, ISO, and other styles
19

Chochtoula, Despoina, Aristidis Ilias, Yannis C. Stamatiou, and Christos Makris. "Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol." Future Internet 14, no. 8 (2022): 232. http://dx.doi.org/10.3390/fi14080232.

Full text
Abstract:
SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions. However, due to their attachment to the Internet, SCADA systems are, today, vulnerable to attacks such as, among several others, interception of data traffic, malicious modifications of settings and control operations data, malicious modification of measurements and infrastructure data and Denial-of-Service attacks. Our research focuses on strengthening SCADA systems with cryptographic methods and protectio
APA, Harvard, Vancouver, ISO, and other styles
20

Satapure, Pratiksha. "Different Methods of Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 170–77. http://dx.doi.org/10.22214/ijraset.2021.38732.

Full text
Abstract:
Abstract: Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vita
APA, Harvard, Vancouver, ISO, and other styles
21

Dmytro, Poltavskyi. "Cryptographic techniques in blockchain for enhanced digital asset security." American Journal of Engineering and Technology 07, no. 05 (2025): 76–87. https://doi.org/10.37547/tajet/volume07issue05-06.

Full text
Abstract:
This article examines the role cryptographic methods play in protecting digital assets through blockchain systems, with a particular focus on their adjustment to contemporary challenges and technological trends. An endeavor is undertaken to systematize major cryptographic algorithms, their effective appraisal in data protection, and development prospects under quantum computing threats. The study is relevant because centralized systems increasingly depend on cryptography due to greater regulatory pressures and, above all, a need for security through secrecy. The scientific novelty lies in the
APA, Harvard, Vancouver, ISO, and other styles
22

Feilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (2024): 227–40. http://dx.doi.org/10.52783/jes.635.

Full text
Abstract:
In an increasingly interconnected world, the convergence of power system networks and biometric-based biomedical applications presents unique challenges for data protection and privacy. This research endeavors to conceptualize and design an intelligent countermeasure system that serves as a robust defense mechanism for enhancing security in this complex ecosystem. The proposed system incorporates biometric authentication techniques to fortify user access controls, implements advanced encryption methods for safeguarding sensitive biomedical data, and intrusion detection and prevention mechanism
APA, Harvard, Vancouver, ISO, and other styles
23

Klimushyn, Petro, Tetiana Solianyk, Oleksandr Mozhaev, Vitalii Nosov, Tetiana Kolisnyk, and Vasily Yanov. "HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS." Innovative Technologies and Scientific Solutions for Industries, no. 4 (18) (December 10, 2021): 31–39. http://dx.doi.org/10.30837/itssi.2021.18.031.

Full text
Abstract:
Subject of research: procedures of asymmetric authentication of Internet of Things nodes to ensure the highest level of security using cryptographic chips. The aim of the article is to study the ways of potential use of cryptographic chips to ensure secure authentication of Internet of Things sites using asymmetric cryptography procedures. The article solves the following tasks: analysis of hardware support technologies for asymmetric cryptography of the Internet of Things; definition of secure procedures for asymmetric authentication of Internet of Things sites and their constituent elements:
APA, Harvard, Vancouver, ISO, and other styles
24

Klimushyn, Petro, Tetiana Solianyk, Oleksandr Mozhaiev, Yurii Gnusov, Oleksandr Manzhai, and Vitaliy Svitlychny. "CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES." Innovative Technologies and Scientific Solutions for Industries, no. 2 (20) (June 30, 2022): 22–34. http://dx.doi.org/10.30837/itssi.2022.20.022.

Full text
Abstract:
Subject of research: crypto-resistant methods and tools of generating random sequences and hardware support of cryptographic transformations in IoT devices. The aim of the article is to study crypto-resistant methods and tools for generating and testing random sequences suitable for use in IoT devices with limited resources; determination of circuit implementations of random sequences hardware generators; formation of conclusions on the use of random number generators (RNG) in cryptographic protection systems of the IoT network. The article solves the following tasks: analysis of methods and h
APA, Harvard, Vancouver, ISO, and other styles
25

Geetha, M., and K. Akila. "SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS." IJISCS (International Journal of Information System and Computer Science) 2, no. 3 (2019): 123. http://dx.doi.org/10.56327/ijiscs.v2i3.708.

Full text
Abstract:
With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligibl
APA, Harvard, Vancouver, ISO, and other styles
26

K. Aruna Kumari. "Cryptographic Algorithms and Computational Complexity: A Mathematical Approach to Securing IT Networks." Journal of Information Systems Engineering and Management 10, no. 25s (2025): 409–20. https://doi.org/10.52783/jisem.v10i25s.4037.

Full text
Abstract:
Cryptographic algorithms are at the core of IT network protection through data confidentiality, integrity, and authentication. This study explores the computational efficiency and complexity of four cryptographic algorithms: Advanced Encryption Standard (AES), Rivest-Shamir-Adleman (RSA), Lattice-Based Cryptography (LBC), and Hyperelliptic Curve Cryptography (HECC). The investigation compares these algorithms using encryption time, decryption time, key generation time, and security strength. Experiment outcome shows that AES has the optimal encryption time of 2.3 ms for real-time applicability
APA, Harvard, Vancouver, ISO, and other styles
27

FEDOTOVA, Gilyan V., Yuliya A. KAPUSTINA, and Evgeniya V. ANYANOVA. "Information resources protection technologies on the Internet." National Interests: Priorities and Security 20, no. 10 (2024): 1858–73. http://dx.doi.org/10.24891/ni.20.10.1858.

Full text
Abstract:
Subject. The article addresses problems of information protection, development of approaches to ensuring the security and sustainability of digital platforms. Objectives. The aims are to evaluate the used protocols for information protection, distributed Internet networks and nodes built using cryptography, to analyze individual security solutions in building a digital infrastructure that is resilient to external threats. Methods. The study rests on general scientific research methods. Results. We analyzed methods of cryptographic protection, determined that basic protection methods that are b
APA, Harvard, Vancouver, ISO, and other styles
28

Dymova, H. "Study of Cryptographic Security of Computer Networks." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 57 (February 13, 2025): 15–19. https://doi.org/10.36910/6775-2524-0560-2024-57-02.

Full text
Abstract:
The article examines modern aspects of cryptographic protection of computer networks, which are critically important in the context of growing information threats and cyberattacks, in particular in the context of military operations in Ukraine. The key tasks related to ensuring the confidentiality, integrity, and availability of information, as well as the challenges facing cryptographic systems in the context of the rapid development of computing power and attack methods, are considered. The article contains an analysis of the historical development of cryptography, starting from its fundamen
APA, Harvard, Vancouver, ISO, and other styles
29

Padma, K. U. V., and E. Neelima. "Adaptive lightweight cryptographic framework for data transmission using multi-domain transformations." Multidisciplinary Science Journal 7, no. 11 (2025): 2025460. https://doi.org/10.31893/multiscience.2025460.

Full text
Abstract:
Cryptography has evolved as a cornerstone in data security, encrypting information to prevent unauthorized access. However, when newer technologies emerge, old cryptographic approaches face new hurdles in preserving data secrecy, integrity, and validity. The rapid increase of digital data and communication channels has resulted in a paradigm shift in how information is shared, stored, and accessed. This digital transition has increased exposure to cyber threats, underlining the necessity for strong data security procedures Cryptography, as the science of secure communication, is critical for p
APA, Harvard, Vancouver, ISO, and other styles
30

Baranov, Igor. "Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity." Cybernetics and Computer Technologies, no. 1 (March 28, 2025): 64–73. https://doi.org/10.34229/2707-451x.25.1.6.

Full text
Abstract:
Introduction. Nowadays, computer networks are gaining more and more importance for information exchange. Cryptography plays a vital role in the security of computing, mobile phone communication, passwords in computing and even engineering, unlike in the olden days when cryptography was only about encrypting and decrypting messages with keys. One of the most important requirements of these networks is to ensure the safe transfer of information from one place to another. Cryptography is one of the methods that provide the most secure way of transferring confidential information from the sender t
APA, Harvard, Vancouver, ISO, and other styles
31

Saragi, Dedy Ronald, Janter Manuel Gultom, Jose Andreas Tampubolon, and Indra Gunawan. "Pengamanan Data File Teks (Word) Menggunakan Algoritma RC4." Jurnal Sistem Komputer dan Informatika (JSON) 1, no. 2 (2020): 114. http://dx.doi.org/10.30865/json.v1i2.1745.

Full text
Abstract:
Data security on computers can provide a protection for our data. Cryptographic techniques are very important techniques in securing data. Cryptography is the science of encryption techniques where the "original text" (plaintext) is encrypted using an encryption key into "random text that is difficult to read" (ciphertext) by someone who does not have a decryption key, one of the modern cryptographic methods developed is the RC4 algorithm. RC4 algorithm (Ron’s Code / Rivest’s Cipher) is one algorithm that can be used to encrypt data so that the original data can only be read by someone who has
APA, Harvard, Vancouver, ISO, and other styles
32

Chiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions." BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.

Full text
Abstract:
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems a
APA, Harvard, Vancouver, ISO, and other styles
33

Korchenko, O. G., and O. M. Hryshchuk. "SPEECH INFORMATION CRYPTOGRAPHIC PROTECTION METHOD BASED ON DIFFERENTIAL TRANSFORMATIONS." Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, no. 27 (I) (December 27, 2024): 4–19. https://doi.org/10.46972/2076-1546.2024.27.01.

Full text
Abstract:
The problem of information security that circulates in communication channels is constantly being updated. It is especially acute for military VoIP telephony or dual use. This relates to the growth of the value of confidential information, which is of interest to cybercriminals, and with the increase in the technological complexity of cyberattacks at the same time as the productivity of technical means of obtaining unauthorized information increases. Cryptographic methods of information protection occupy one of the key places among the well-known mechanisms for ensuring the cyber security of s
APA, Harvard, Vancouver, ISO, and other styles
34

Nadia Mustaqim Ansari, Talha Tariq, Rizwan Iqbal, Azhar Abbas, Haider Abbas, and Muhammad Mohsan Zohaib. "QUANTUM CRYPTOGRAPHY: SECURING DATA IN THE POST-QUANTUM COMPUTING ERA – A COMPREHENSIVE EXPLORATION OF THE FUTURE OF CYBERSECURITY." Kashf Journal of Multidisciplinary Research 2, no. 02 (2025): 28–43. https://doi.org/10.71146/kjmr259.

Full text
Abstract:
Classical cryptographic systems face a hazardous situation because quantum computing operates as a threat vector against classical systems through Shor's and Grover's algorithms. Through Shor's algorithm factoring large integers results in a breach of RSA encryption methods whereas Grover's algorithm enables substantially quicker searches of unsorted databases to diminish symmetric key encryption strength. The advanced features of quantum systems eliminate the foundation of security that classical cryptographic techniques depend on computation complexity for protection. Quantum Key Distributio
APA, Harvard, Vancouver, ISO, and other styles
35

Hussain, Zakir, and Sonia Chamoli. "Enhancing Cloud Security: A Hybrid Cryptographic Approach Combining AES and RSA for Optimal Data Protection." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 07 (2025): 1–9. https://doi.org/10.55041/ijsrem51243.

Full text
Abstract:
As technology develops, the cloud is turning into a repository for private information, making it increasingly vulnerable, especially as more people with bad motives get a hold of it. Data needs to be secure and safe because so many people use the cloud for various reasons. A new hybrid encryption process that combines symmetric and asymmetric cryptographic techniques to create a safe environment is proposed in this paper, which analyzes the well-known symmetric Advanced Encryption Standard (AES) method and the asymmetric Rivest-Shamir-Adleman (RSA) method based on time complexity, space, reso
APA, Harvard, Vancouver, ISO, and other styles
36

Inķēna, Kristiāna, and Sergejs Kodors. "E-SAFETY PROBLEMS AND PROTECTION METHODS." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 22 (April 25, 2018): 37–42. http://dx.doi.org/10.17770/het2018.22.3639.

Full text
Abstract:
E-security is the protection of all data stored on computer networks and computer systems against damage, loss or unauthorized access. E-security, based on the definition, is all that can be related to the safe use of the Internet, personal knowledge and behavior, and ethics on the Internet. There are examined following threats to websites - the leakage of information, cross-site scripting attacks, injection, unsafe direct object reference, CSRF, security configuration errors, unsafe cryptographic repository, and redirection and transmission without validation. The author reviews the cyber att
APA, Harvard, Vancouver, ISO, and other styles
37

J, Mala. "CLOUD DATA PROTECTION FOR PERSONAL HEALTH RECORDS USING PROXY- ENCRYPTION BASED RABIN CERTIFICATELESS SIGNCRYPTION." ICTACT Journal on Communication Technology 15, no. 4 (2024): 3325–31. https://doi.org/10.21917/ijct.2024.0494.

Full text
Abstract:
Protecting cloud-based personal health records (PHRs) is critical to- ensuring privacy and data security for individuals in an era of rapidly growing digital healthcare systems. Traditional encryption methods face challenges in balancing computational efficiency with robust data protection. Proxy-based certificateless cryptography offers a promising solution by eliminating the need for certificate management while enabling seamless secure communication. In this work, a Proxy-Encryption Based Rabin Certificateless Signcryption (PERSC) scheme is proposed to enhance the security and efficiency of
APA, Harvard, Vancouver, ISO, and other styles
38

Ibrahimov, Bayram G., Ramiz T. Humbatov, and Rufat F. Ibrahimov. "Cryptographic Methods And Means Protection Transmitted Information in Telecommunication Systems." IFAC-PapersOnLine 51, no. 30 (2018): 821–24. http://dx.doi.org/10.1016/j.ifacol.2018.11.187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Eliel Kundai Zhuwankinyu, Munashe Naphtali Mupa, and Sylvester Tafirenyika. "Graph-based security models for AI-driven data storage: A novel approach to protecting classified documents." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 1108–24. https://doi.org/10.30574/wjarr.2025.26.2.1631.

Full text
Abstract:
Corporate data storage systems are susceptible to cyber threats; thus, securing them is a central problem in Artificial Intelligence (AI). Graph-Based Security Models (GBSM) form a reliable and scalable approach to reinforcing cybersecurity. These models help to map out extended cyber threats comprehensively and facilitate enhanced threat identification, anomaly detection, and cryptographic integrity. Special emphasis has to do with integrating AI with GBSM as it enhances real-time anomaly detection, automated threat response, cryptographic computing, and other approaches that make it a helpfu
APA, Harvard, Vancouver, ISO, and other styles
40

TN, Nikhil. "Exploring on Cloud Security Landscapes:A Comprehensive Review." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34217.

Full text
Abstract:
Nowadays, the massive growth of data and the adoption of the cloud-based architecture indicate that the secure storage of data is a very essential issue. Cloud storage is the solution to convenient, scalable and cost-effective storage, yet security issues persist, especially regarding the protection of sensitive information. The encryption plays a vital role in which data is made unreadable and only accessible by those with the proper authorization. This helps in data management and minimizes data leaks. Shared responsibility in cloud security entails collaboration between the operators and us
APA, Harvard, Vancouver, ISO, and other styles
41

Manap, Abusaid, Gulnar Abitova, Gulzhan Uskenbayeva, and Aigul Shaikhanova. "DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID CRYPTOGRAPHY METHODS: SHORT OVERVIEW." Вестник КазАТК 129, no. 6 (2023): 205–15. http://dx.doi.org/10.52167/1609-1817-2023-129-6-205-215.

Full text
Abstract:
In the era of pervasive digital data, ensuring secure file storage has become a paramount concern. This paper explores the significance of hybrid cryptography in the development of information technology for secure file storage. Hybrid cryptography, combining symmetric and asymmetric encryption, offers robust protection against unauthorized access, tampering, and data loss. The article reviews recent cryptography literature, highlighting the importance of secure file storage in today's interconnected world and examining the benefits of hybrid cryptography. The analysis of articles on cryptogra
APA, Harvard, Vancouver, ISO, and other styles
42

Karpenko, Andrii, Tetiana Bondarenko, Viacheslav Ovsiannikov, and Valerii Martyniuk. "ENSURING INFORMATION SECURITY IN WIRELESS SENSOR NETWORKS." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 54–66. http://dx.doi.org/10.28925/2663-4023.2020.10.5466.

Full text
Abstract:
The problem of information security in wireless sensor networks is considered in this paper. An analysis of existing recommendations for information security in wireless sensor networks. It was found that one of the key problems of information security is the hardware limitations of the sensor nodes of the network. It is substantiated that the use of more complex cryptographic protection mechanisms will increase the load on the network. Safety requirements and their description are given. The main groups and types of information security threats in wireless sensor networks are considered. The
APA, Harvard, Vancouver, ISO, and other styles
43

ЛАВРИК, ІВАН. "ДОСЛІДЖЕННЯ АЛГОРИТМІВ ПОСТКВАНТОВОГО ЦИФРОВОГО ПІДПИСУ". Herald of Khmelnytskyi National University. Technical sciences 333, № 2 (2024): 361–69. http://dx.doi.org/10.31891/2307-5732-2024-333-2-56.

Full text
Abstract:
The continuous development of quantum computing requires the development of cryptographic algorithms resistant to quantum cryptanalysis. Therefore, the National Institute of Standards and Technology (NIST) is holding a competition to standardize algorithms in the post-quantum period, including Crystals-Dilithium, Falcon, and Sphincs+ for digital signatures. In order to determine the ways of development and ways to improve the existing methods of cryptographic protection and electronic digital signature (EDS), an urgent task arose to assess the effectiveness (stability and computational complex
APA, Harvard, Vancouver, ISO, and other styles
44

Smirnova, Tetiana, Nataliia Yakymenko, Oleksandr Ulichev, Oksana Konoplitska-Slobodeniuk Konoplitska-Slobodeniuk, and Serhii Smirnov. "INVESTIGATION OF LINEAR TRANSFORMATIONS OF THE PROPOSED HUSHING FUNCTION OF THE ADVANCED MODULE OF CRYPTOGRAPHIC PROTECTION IN INFORMATION AND CIRCUMSTANCES." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 85–92. http://dx.doi.org/10.28925/2663-4023.2022.15.8592.

Full text
Abstract:
This paper investigates the linear transformations of the hash function, which is part of the developed advanced module of cryptographic protection of information, which by capturing information about the user ID, session ID, sending time, message length and sequence number, as well as using a new session key generation procedure for encryption, allows you to ensure the confidentiality and integrity of data in information and communication systems process control. The object of research is the process of ensuring the confidentiality of data in information and communication systems management s
APA, Harvard, Vancouver, ISO, and other styles
45

Banu, Anees. "Improved Algorithm of Steganography Combined with Cryptography." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 3793–804. http://dx.doi.org/10.22214/ijraset.2021.35792.

Full text
Abstract:
When it comes to preventing unauthorised access to, destruction of, or inspection of confidential data, information security has always been a major factor. Multimedia information is now used in every field throughout the world. The confidential information that is used in these areas must be kept secure. There are a variety of methods for keeping data secure. One of these is steganography, which is concealing information within other data into a format that the cover information remains unchanged. Cryptography, an encryption process that scrambles data into a written form that is sometimes re
APA, Harvard, Vancouver, ISO, and other styles
46

Saukhanova, Zhanat, Altynbek Sharipbay, Gulmira Shakhmetova, Alibek Barlybayev, Sayat Raykul, and Altay Khassenov. "Identifying the efficiency of applying of finite automata in encryption and decryption." Eastern-European Journal of Enterprise Technologies 3, no. 9 (135) (2025): 65–78. https://doi.org/10.15587/1729-4061.2025.331044.

Full text
Abstract:
The contemporary cryptographic field is marked by efforts to enhance traditional methods through the integration of novel mathematical concepts. This fusion seeks to address the shortcomings of classical cryptography, tackle emerging security challenges, and devise more sophisticated data protection systems. Among these innovations is the application of finite automata, or CryptoAutomata, used as encoders and decoders. The object of this research is the use of finite automata, specifically CryptoAutomata, in cryptographic systems. The study addresses the problem of vulnerabilities in classical
APA, Harvard, Vancouver, ISO, and other styles
47

Siregar, Yunita Sari, Mufida Khairani, Herlina Harahap, and Yessy Fitri Annisa Lubis. "The Implementation Of Discrete Cosine Transform (DCT) And Blowfish Methods In Digital Video Security." Sinkron 7, no. 1 (2022): 232–42. http://dx.doi.org/10.33395/sinkron.v7i1.11286.

Full text
Abstract:
Collecting data partially or completely illegally without the permission of the owner causes losses to the copyright owner. This has a big impact in proving ownership of a digital media. To be able to prove ownership of the copyright, the Discrete Cosine Transform watermarking technique can be used by inserting the Blowfish cryptographic algorithm. Discrete Cosine Transform (DCT) is a method that converts digital data into the form of a frequency domain. The method used in the DCT transformation technique is to break the digital image into small blocks with a fixed size and then convert it fro
APA, Harvard, Vancouver, ISO, and other styles
48

Mammadov, Farman Khubali. "NEW APPROACH TO BOOK CIPHER: WEB PAGES AS A CRYPTOGRAPHIC KEY." Advanced Information Systems 7, no. 1 (2023): 59–65. http://dx.doi.org/10.20998/2522-9052.2023.1.10.

Full text
Abstract:
Research relevance: Since ancient times, people have widely used methods of concealment and coding during information sharing, and ensuring the protection of information is currently relevant. Encryption methods are developing daily in order to ensure the reliable protection of confidential information and the exchange of data on the network. The subject and purpose of the research are to develop an encryption method, which is based on the ideology of book cipher and uses web pages as a cryptographic key, in the organization of a secure exchange of information. The following tasks are solved i
APA, Harvard, Vancouver, ISO, and other styles
49

Zhang, Liwen. "Cryptography and DRM: A study of digital copyright protection in the gaming industry." Applied and Computational Engineering 89, no. 1 (2024): 121–24. http://dx.doi.org/10.54254/2755-2721/89/20241059.

Full text
Abstract:
Abstract. This paper explores the role of cryptography and encryption technology in the evolution of digital rights management (DRM) in the gaming industry. A collection of guidelines, procedures, and instruments that control the appropriate use of digital content is collectively referred to as digital rights management (DRM). Cryptography plays a vital role in DRM by ensuring data privacy, authenticity, and integrity. The early stages of DRM in gaming involved physical disc-based methods, such as unique disc features and online activation. However, these methods faced challenges such as compa
APA, Harvard, Vancouver, ISO, and other styles
50

Lewis, Nehama, Yaron Connelly, Gil Henkin, Max Leibovich, and Adi Akavia. "Factors Influencing the Adoption of Advanced Cryptographic Techniques for Data Protection of Patient Medical Records." Healthcare Informatics Research 28, no. 2 (2022): 132–42. http://dx.doi.org/10.4258/hir.2022.28.2.132.

Full text
Abstract:
Objectives: Healthcare organizations that maintain and process Electronic Medical Records are at risk of cyber-attacks, which can lead to breaches of confidentiality, financial harm, and possible interference with medical care. State-of-the-art methods in cryptography have the potential to offer improved security of medical records; nonetheless, healthcare providers may be reluctant to adopt and implement them. The objectives of this study were to assess current data management and security procedures; to identify attitudes, knowledge, perceived norms, and self-efficacy regarding the adoption
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!