To see the other types of publications on this topic, follow the link: Cryptography and Information Security.

Journal articles on the topic 'Cryptography and Information Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cryptography and Information Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Tayyaba Sultana, Tayyaba Sultana. "Information Security with Cryptography." International Journal for Electronic Crime Investigation 2, no. 1 (2018): 6. http://dx.doi.org/10.54692/ijeci.2018.02019.

Full text
Abstract:
The purpose of Information Security and Cryptography is to secure the data transmission and network over wireless network. The main feature of data Security is to protect transmission of data over unsecure network. The authorization of access over the data within the network is included in Information Security and which is managed by the administration of network. The users are authorized and have their own ID and password or may be some other validating information which permits them to access the programs and information under their limited authority. Diversity of computer networks is covered by information Security, private and public both, which are used in daily routine jobs directing communications and transactions among individuals, businesses and government agencies. Network might be open for the public to access or they can be private like within a company. Businesses, organizations and other kind of institutions are covered by Information Security. We will study about the cryptography and its principles in this paper. Cryptographic systems with ciphers are presented. The cryptographic algorithms and models are outlined.
APA, Harvard, Vancouver, ISO, and other styles
2

Shashi Raj K. "The Intersection of Algebra and Cryptography: Enhancing Information Security through Mathematical Foundations." Communications on Applied Nonlinear Analysis 31, no. 4s (2024): 466–89. http://dx.doi.org/10.52783/cana.v31.943.

Full text
Abstract:
The rapid advancements in digital technologies have necessitated the development of robust information security measures. This paper explores the intersection of algebra and cryptography, focusing on how algebraic principles can enhance cryptographic techniques to provide stronger security foundations. By leveraging mathematical structures such as groups, rings, and fields, we can address critical challenges in encryption, secure communications, and data privacy. This study reviews key algebraic methods used in contemporary cryptographic protocols, including elliptic curve cryptography, homomorphic encryption, and lattice-based cryptography, and demonstrates their practical applications through detailed case studies. Our comparative analysis highlights the superior performance and security of algebra-based cryptographic solutions compared to traditional methods. Finally, we discuss the emerging trends and future directions in algebraic cryptography, emphasizing the potential of these mathematical foundations to address the evolving threats in information security.
APA, Harvard, Vancouver, ISO, and other styles
3

Prayoga, Estu. "PENGEMBANGAN SISTEM KEAMANAN INFORMASI BERKELANJUTAN DENGAN TEKNOLOGI KRIPTOGRAFI." Jurnal Sistem Informasi Kaputama (JSIK) 8, no. 2 (2024): 67–74. http://dx.doi.org/10.59697/jsik.v8i2.813.

Full text
Abstract:
In the era of digitalization, ensuring the security of information has become a critical concern for organizations. This paper explores the development of sustainable information security systems by leveraging cryptography technology. The study begins with a comprehensive review of contemporary challenges in information security and recent advancements in cryptography. It then discusses the integration of cryptography into the design and implementation of information security systems to achieve sustainability goals. Furthermore, a case study is presented to illustrate the practical application of sustainable information security system development with cryptography. The findings emphasize the importance of incorporating cryptographic techniques in addressing security threats while promoting sustainable practices. This paper contributes to the understanding of how organizations can enhance their information security posture while embracing principles of sustainability.
APA, Harvard, Vancouver, ISO, and other styles
4

Anilkumar, Chunduru, Swathi Lenka, N. Neelima, and Sathishkumar V E. "A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution." Scalable Computing: Practice and Experience 25, no. 1 (2024): 21–33. http://dx.doi.org/10.12694/scpe.v25i1.2152.

Full text
Abstract:
Security awareness is one of the most pressing topics in today's globe. The idea of cryptography is introduced when the subject is information security. Conventional cryptography-based security techniques rely on the presumption that keys are shared before secure connections. The most crucial factor to consider when integrating cryptographic operations into account when integrating cryptographic operations in with any system is the safe key management strategy required for sending and transferring a secret key between two entities The systems will be vulnerable to bugs and possibly fatal external assaults if the fundamental management methods are poor A method for securely encrypting data sent between parties is quantum cryptography. and spotting eavesdroppers trying to overhear the conversation. Quantum cryptography may be the solution to these issues a quantum cryptography application, Quantum Key Distribution (QKD), refers to the production of a cryptographic key with unconditional security assured by physical rules. Quantum cryptography is a kind of encryption. We examine the quantum key exchange protocol (BB84 protocol) in this study and the way that it significantly improves data transfer security when compared to standard encryption techniques. The main objective of quantum cryptography is to offer a trustworthy way to provide a secure method of communication between the intended peers only and to detect the Eavesdropper presence.
APA, Harvard, Vancouver, ISO, and other styles
5

Imai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, no. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Banu, Anees. "Improved Algorithm of Steganography Combined with Cryptography." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 3793–804. http://dx.doi.org/10.22214/ijraset.2021.35792.

Full text
Abstract:
When it comes to preventing unauthorised access to, destruction of, or inspection of confidential data, information security has always been a major factor. Multimedia information is now used in every field throughout the world. The confidential information that is used in these areas must be kept secure. There are a variety of methods for keeping data secure. One of these is steganography, which is concealing information within other data into a format that the cover information remains unchanged. Cryptography, an encryption process that scrambles data into a written form that is sometimes referred to as a hash, is an auxiliary approach for securing information. Steganography and cryptography each have their own set of benefits and drawbacks. Even though both technologies give security, it is usually a good practise to combine Cryptographic algorithms to create additional layers of security. When cryptographic with steganography are combined, a multi-layer security paradigm is created. The proposed work's main goal is to add an additional layer of protection by using cryptography and steganography to encrypt and embed secret data conveyed across an insecure channel.
APA, Harvard, Vancouver, ISO, and other styles
7

Patel, Krisha. "Cryptography And Network Security." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem46815.

Full text
Abstract:
Abstract -Cryptography and network security are foundational domains in the field of information technology and cybersecurity. As digital communication continues to expand, protecting data from unauthorized access, tampering, and interception is paramount. This paper presents a detailed review of the core principles, algorithms, protocols, emerging technologies, and challenges in cryptography and network security. We explore classical and modern cryptographic techniques, the structure and defense mechanisms of network security, current advancements such as quantum cryptography and blockchain integration, and propose future research directions.
APA, Harvard, Vancouver, ISO, and other styles
8

Virk, Udayveer Singh, Devansh Verma, Gagandeep Singh, and Prof Sheetal Laroiya Prof. Sheetal Laroiya. "Analyzing Cryptographic Techniques and Machine Learning Algorithms for Crime Prediction." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem38099.

Full text
Abstract:
This report discusses cryptography techniques. Network security is defined as "keeping information hidden and secure from unauthorized users," whereas cryptography is defined as "the science of data protection." The Fundamental Requirements for Data Transmission are addressed in this work and as well as security attacks such as Data Transmission Interruption, Interception, and Modification. The Cryptographic Framework is explained using a generalized function, in which data is encrypted and decrypted using techniques such as the RSA algorithm, Hash Functions, and other cryptographic algorithms.SVM algorithms to analysis and predict the future cyber crime. This report introduces Cryptography Techniques. Cryptography is “The science of protecting data” & Network Security “keeping information private and Secure from unauthorized Users”. This paper gives the Fundamental Requirements for the Data Transmission, the security attacks like Interruption, Interception and Modification of the data Transmission. Keywords—cryptography, cybersecurity, machine learning, cybercrime prediction
APA, Harvard, Vancouver, ISO, and other styles
9

Subhalaxmi Sabitri Das, Subhalaxmi Sabitri Das, Sachin Jena Sachin Jena, and H. Dipali Singh H.Dipali Singh. "The Role of Cryptography in Cyber Security." International Journal of Engineering and Science Invention 14, no. 5 (2025): 48–54. https://doi.org/10.35629/6734-14054854.

Full text
Abstract:
One description of cryptography is the study and practice of information concealment. Cryptography intersects with fields like computer wisdom and mathematics. Among the terms used in this term paper are plaintext, or information to be conveyed, Cipher textbook, or ordinary textbook that has been made incomprehensible by an operation of a fine procedure, The key is a numerical value, formula, or procedure that establishes how a plaintext communication is translated or deciphered. The cryptographic algorithm, also, is a fine formula that's used to tousle the plain textbook to produce cipher textbook. Public crucial cryptography (PKC), hash functions, and secret crucial cryptography (SKC) are the three orders of cryptography. Each bone of them will be completely described.
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar Bathala, Naresh, Naga Pawan YVR, Dhrubajyoti Choudhury, Ambika M, Kannadhasan S, and Padmavathy R. "Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems." ITM Web of Conferences 76 (2025): 05005. https://doi.org/10.1051/itmconf/20257605005.

Full text
Abstract:
Quantum computing has the potential to transforming computational paradigms, posing both a threat and an opportunity to contemporary cryptographic systems and data security frameworks. As quantum algorithms improve, pose a risk to traditional encryption solutions, and the concepts of post-quantum cryptography and quantum-safe security architectures gain momentum, it is of paramount importance that organizations stay ahead of the threat landscape. Keywords— Quantum Computing, Cryptography, Information Systems. This work reviewed the implications of quantum computing in the field of Cryptography and Data Security within Information Systems, analyzing three relevant problems encountered: secure key distribution, computational performance and cryptographic migration; Many works were unable to empirically validate or implement quantum-resistant algorithms in the real world, which represents a significant limitation to existing studies. This work tries to fill this gap by characterizing the security of post-quantum cryptography, including lattice-based, hash-based, and multivariate polynomial cryptosystems, from quantum attacks. Furthermore, we provide a multi-layered security framework that combines quantum-safe encryption, AI-powered anomaly detection, and blockchain-based authentication that would increase resilience against quantum attacks. This research bridges the gap by offering sector-specific insights into quantum security needs across key industries, including finance, healthcare, and government, facilitating the drafting of a standardized security framework and policy recommendations for a quantum-secure future. The research will help organizations and policymakers understand how they can implement scalable quantum-resistant cryptographic solutions and address potential cybersecurity risks associated with the post-quantum world.
APA, Harvard, Vancouver, ISO, and other styles
11

Lakshmi, Malyala Sravya, and Gadi Lava Raju. "A Comprehensive Study on Visual Cryptography." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 08 (2014): 1065–69. https://doi.org/10.5281/zenodo.14752169.

Full text
Abstract:
This article is a deal with the Review study of visual cryptography there is a need for study. The information helps the mathematician, computer engineers, Academicians’ and researchers for better understanding of data whenever it is required. So for this a study is made on the basis of secondary data. Cryptography in the study of mathematical techniques related aspects of information security such as confidentialities, data security, entity authentication, but it is not only the means of providing information security, rather one of the techniques. Visual cryptography is a new technique which provides information security which uses simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows Visual information like pictures, text. to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. . In this paper we provide an overview of the emerging Visual Cryptography (VC) and related security. Research work done in this area. 
APA, Harvard, Vancouver, ISO, and other styles
12

Shuxrat, Toirov Abduganiyevich, Eldor Islomovich Saidakhmedov, and X.U Akbarov. "Enhancing post-quantum security through hybrid cryptographic systems integrating quantum key distribution." Yashil iqtisodiyot va taraqqiyot 3, no. 2 (2025): 6–10. https://doi.org/10.5281/zenodo.14868992.

Full text
Abstract:
As quantum computing continues to evolve, traditional cryptographic systems face significant vulnerabilities,especially asymmetric algorithms based on factorization and discrete logarithms. In response, the integration of QuantumKey Distribution with post-quantum cryptography presents a promising hybrid approach to ensuring long-term data security.This new topic explores the design and development of cryptographic systems that combine the computational resilienceof post-quantum cryptography algorithms, such as lattice-based cryptography, with the physical security guaranteesprovided by Quantum Key Distribution. This topic aims to advance the adoption of quantum-resistant cryptography whileleveraging the unique advantages of QKD to create a robust and future-proof cryptographic ecosystem. The synergyof physical quantum security and mathematical post-quantum security represents a groundbreaking innovation insafeguarding sensitive information in the quantum era.
APA, Harvard, Vancouver, ISO, and other styles
13

Dr., S.Rajendirakumar. "Quantum Mechanics for Secure Communication: The Promise of Quantum Cryptography." IJAPR Journal, UGC Indexed & Care Listed 6, no. 4 (2021): 370–75. https://doi.org/10.5281/zenodo.8196007.

Full text
Abstract:
<strong>Cryptography is the science of securing information by transforming it into a form that cannot be easily understood by unauthorized individuals. Traditional cryptography is based on mathematical problems that are difficult to solve, but as quantum computers become more powerful, these problems will become easier to solve. Quantum cryptography is a promising approach to data security that is immune to attack by quantum computers. It uses the principles of quantum mechanics to create secure communication channels. This article provides an overview of quantum cryptography, including the basic principles, different types of quantum cryptographic protocols, and some of the challenges that are still being addressed. The article also discusses the potential of quantum cryptography to revolutionize data security in the future.</strong>
APA, Harvard, Vancouver, ISO, and other styles
14

Santoso, Yogi Suryo. "Message Security Using a Combination of Hill Cipher and RSA Algorithms." Jurnal Matematika Dan Ilmu Pengetahuan Alam LLDikti Wilayah 1 (JUMPA) 1, no. 1 (2021): 20–28. http://dx.doi.org/10.54076/jumpa.v1i1.38.

Full text
Abstract:
The process of exchanging digital messages is increasingly being used due to its easy and practical use. But the process of exchanging digital messages is vulnerable to being tapped by unauthorized people. Cryptography is the study of mathematical techniques related to aspects of information security, such as data confidentiality, data validity, data integrity, and data authentication. With cryptography, the process of exchanging messages between two people can be done securely. Thus, cryptographic techniques are used to overcome security issues when exchanging messages. The methods used in this study are hybrid hill cipher and RSA cryptography. In this study it was shown that hybrid hill cipher cryptography with a 3x3 matrix key and RSA with a 512 bit key can overcome security issues when exchanging data so that messages sent cannot be read by unauthorized people.
APA, Harvard, Vancouver, ISO, and other styles
15

Alshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.

Full text
Abstract:
Recent breakthroughs in cryptographic technology are being thoroughly scrutinized due to their emphasis on innovative approaches to design, implementation, and attacks. Lightweight cryptography (LWC) is a technological advancement that utilizes a cryptographic algorithm capable of being adjusted to function effectively in various constrained environments. This study provides an in-depth analysis of elliptic curve cryptography (ECC), which is a type of asymmetric cryptographic method known as LWC. This cryptographic approach operates over elliptic curves and has two applications: key exchange and digital signature authentication. Next, we will implement asymmetric cryptographic algorithms and evaluate their efficiency. Elliptic curve elgamal algorithms are implemented for encryption and decryption of data. Elliptic curve Diffie-Hellman key exchange is used for sharing keys. Experimental results have shown that ECC needs small size keys to provide similar security. ECC takes less time in key generation, encryption and decryption of plain text. Time taken by ECC to generate a 2,048 bit long key is 1,653 milliseconds in comparison to 4,258 millisecond taken by Rivest-Shamir-Adleman (RSA) technique.
APA, Harvard, Vancouver, ISO, and other styles
16

Dr., Harshala B. Pethe*1 Varsha C. Pande2 &. Dr. Subhash R. Pande3. "PERFORMANCE ANALYSIS OF AES AND BLOWFISH CRYPTOGRAPHIC ALGORITHMS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES [NC-Rase 18] (November 12, 2018): 50–56. https://doi.org/10.5281/zenodo.1483995.

Full text
Abstract:
Information security plays very important role in storing and transmitting the data through unsecured channel. Cryptography plays a very important role in the network security to maintain the CIA triad that is Confidentiality, Integrity, Authentication and non-repudiation of information. Due to that security of information is much important in data storage and transmission process. Using cryptography, the data is encoded before sending it and decoded after receiving, Cryptographic algorithms are broadly divided into two types, symmetric key and asymmetric key cryptographic algorithms.There are various symmetric key algorithms available such as DES, AES Blowfish, Two fish, SAFER etc. This paper deals with the performance analysis of symmetric key cryptographic algorithms AES and Blowfish.
APA, Harvard, Vancouver, ISO, and other styles
17

Teja, Penumantra Satya Sai, Mounika Lakshmi P, and Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols." International Research Journal of Electronics and Computer Engineering 4, no. 3 (2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.

Full text
Abstract:
Quantum cryptography is a new method of communication offering the security of the inviolability by using Law of Nature.Quantum Cryptography uses different secure communication by applying the phenomena of quantum physics. Unlike traditional classical cryptography, which uses mathematical techniques to restrict eavesdroppers, quantum cryptography is focused on the properties of physics of light for information. Quantum cryptography depends only on the validity of quantum theory, i.e., it is guarantied directly by the laws of physics. This is a different from any classical cryptographic techniques. This paper summarizes the current state of quantum cryptography and provides potential extensions of its feasibility as a mechanism for securing existing communication systems.
APA, Harvard, Vancouver, ISO, and other styles
18

Dewamuni, Zenith, Bharanidharan Shanmugam, Sami Azam, and Suresh Thennadil. "Bibliometric Analysis of IoT Lightweight Cryptography." Information 14, no. 12 (2023): 635. http://dx.doi.org/10.3390/info14120635.

Full text
Abstract:
In the rapidly developing world of the Internet of Things (IoT), data security has become increasingly important since massive personal data are collected. IoT devices have resource constraints, which makes traditional cryptographic algorithms ineffective for securing IoT devices. To overcome resource limitations, lightweight cryptographic algorithms are needed. To identify research trends and patterns in IoT security, it is crucial to analyze existing works, keywords, authors, journals, and citations. We conducted a bibliometric analysis using performance mapping, science mapping, and enrichment techniques to collect the necessary information. Our analysis included 979 Scopus articles, 214 WOS articles, and 144 IEEE Xplore articles published during 2015–2023, and duplicates were removed. We analyzed and visualized the bibliometric data using R version 4.3.1, VOSviewer version 1.6.19, and the bibliometrix library. We discovered that India is the leading country for this type of research. Archarya and Bansod are the most relevant authors; lightweight cryptography and cryptography are the most relevant terms; and IEEE Access is the most significant journal. Research on lightweight cryptographic algorithms for IoT devices (Raspberry Pi) has been identified as an important area for future research.
APA, Harvard, Vancouver, ISO, and other styles
19

Annu. "Algebraic Structures and Their Applications in Modern Cryptography." Innovative Research Thoughts 10, no. 3 (2024): 52–59. http://dx.doi.org/10.36676/irt.v10.i3.1433.

Full text
Abstract:
Modern cryptography relies heavily on the principles of algebraic structures to ensure the security and integrity of data. This paper explores the fundamental algebraic structures that underpin contemporary cryptographic systems, including groups, rings, fields, and lattices. We provide a detailed examination of how these structures are employed in various cryptographic algorithms and protocols, such as public-key cryptography, digital signatures, and hash functions. an overview of basic algebraic concepts and their properties, followed by an in-depth analysis of their applications in cryptographic schemes. For instance, the use of elliptic curve groups in Elliptic Curve Cryptography (ECC) offers enhanced security with smaller key sizes compared to traditional systems like RSA. Similarly, lattice-based cryptography presents promising solutions for post-quantum security, leveraging the hardness of lattice problems to resist attacks by quantum computers. the role of algebraic structures in the development of advanced cryptographic techniques, such as homomorphic encryption, which allows computations on encrypted data without decryption, and zero-knowledge proofs, which enable the verification of information without revealing the information itself. Through these examples, we illustrate the critical importance of algebraic structures in achieving robust and efficient cryptographic systems.
APA, Harvard, Vancouver, ISO, and other styles
20

Slashi Leel. "Graph - Based Innovations in Cryptographic Security." Communications on Applied Nonlinear Analysis 32, no. 7s (2025): 744–58. https://doi.org/10.52783/cana.v32.3480.

Full text
Abstract:
Cryptography focuses on securely transmitting messages from one party to another, ensuring that an unauthorized third party cannot comprehend them. To achieve this, various mathematical concepts, particularly from Graph Theory, have been incorporated into cryptographic techniques for more secure data transmission. The process of converting the original plain-text message into an unreadable cipher-text is known as encryption, while converting the cipher-text back to the original plain-text is referred to as decryption. Graph Theory is essential in numerous fields, particularly in cryptography, where its properties and straightforward matrix representation in computers make it highly valuable. In this paper the encryption and decryption process has been made more safer by using adjacent matrix of complement graph.Introduction: In today's digital communication landscape, ensuring secure data transmission is essential, and cryptography plays a vital role in safeguarding sensitive information. Graph theory, with its intricate structures and concepts, offers innovative frameworks for creating robust encryption methods. This research explores using adjacency matrices, graph complements, and disjoint graphs to develop secure cryptographic systems. By leveraging graph complements and structural complexities, these methods obscure messages, enhancing resistance to cryptographic attacks. Applications range from securing communication channels to enhancing blockchain privacy. Building on previous studies, this work demonstrates the potential of graph-theory-based cryptography in addressing modern security challenges effectively.
APA, Harvard, Vancouver, ISO, and other styles
21

Sanchez-Reillo, R., C. Lopez-Ongil, L. Entrena-Arrontes, and C. Sanchez-Avila. "Information technology security using cryptography." IEEE Aerospace and Electronic Systems Magazine 18, no. 6 (2003): 21–24. http://dx.doi.org/10.1109/maes.2003.1209586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Tuo, Zehao. "A comparative Analysis of AES and RSA algorithms and their integrated application." Theoretical and Natural Science 25, no. 1 (2023): 28–35. http://dx.doi.org/10.54254/2753-8818/25/20240893.

Full text
Abstract:
Cryptography holds a significant place in the realm of information technology, safeguarding sensitive information from unauthorized access. This discourse centers on two prevalent cryptographic algorithms: AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman). While AES falls under the category of symmetric cryptography, RSA is a part of asymmetric cryptography. The papers objective lies in furnishing readers with an insightful exploration of both algorithms, delving into their respective strengths and weaknesses. A comprehensive examination reveals the intricate details of their operation, highlighting the security aspects and potential vulnerabilities. Understanding the fundamental distinctions and the operational mechanics of AES and RSA contributes to an enhanced perception of their application in diverse cryptographic contexts. Beyond this, the paper delves into the synergistic utilization of AES and RSA, presenting an innovative approach to reinforcing information security. This integration leverages the unique advantages of both algorithms, mitigating their individual limitations and bolstering the security framework. In essence, a balanced perspective on AES and RSA, along with their collaborative application, furnishes a robust foundation for informed cryptographic choices, fortifying the safeguarding of sensitive data against emerging security threats.
APA, Harvard, Vancouver, ISO, and other styles
23

Pratarshi, Saha, Gurung Sandeep, and Krishanu Ghose Kunal. "HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 163–79. https://doi.org/10.5281/zenodo.4724281.

Full text
Abstract:
With the increasing popularity of information technology in communication network, security has become an inseparable but vital issue for providing for confidentiality, data security, entity authentication and data origin authentication. Steganography is the scheme of hiding data into a cover media to provide confidentiality and secrecy without risking suspicion of an intruder. Visual cryptography is a new technique which provides information security using simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows visual information to be encrypted in such a way that their decryption can be performed by the Human Visual System (HVS), without any complex cryptographic algorithms. To provide a better secured system that ensures high data capacity and information security, a multilevel security system can be thought for which can be built by incorporating the principles of steganography and visual cryptography.
APA, Harvard, Vancouver, ISO, and other styles
24

K., Thamizhmaran. "Network Security Using Symmetric Cryptography." Journal of Recent Trends in Electrical Power System 8, no. 1 (2025): 36–46. https://doi.org/10.5281/zenodo.15210581.

Full text
Abstract:
<em>The idea behind network security and cryptography is to safeguard wireless networks and data transfer. The network administrator controls network security, which includes granting access to data within a network. Users can access information and programs within their authority by selecting or being given an ID, password, or other authenticating information. Numerous computer networks, both public and private, that are utilized in daily tasks to carry out transactions and communications between companies, governmental organizations, and individuals are covered by network security. Some networks may be accessible to the general public, while others may be private, such those found within businesses. Organizations, businesses, and other kinds of institutions are all involved in network security. We also examined the fundamentals of cryptography in this article. Cipher-based cryptographic systems are explained.</em>
APA, Harvard, Vancouver, ISO, and other styles
25

Venu, S. V. V. D., Didde Keerthika, Mavuri Rajasri, and Vanapalli Bhavani. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43553.

Full text
Abstract:
Phishing attacks are one of the most common attacks where the attacker tries to steal sensitive information of one individual like user names, passwords, credit card numbers, or other personal data, by manipulating the user by behaving as a legitimate request. These attacks are considered a threat as they involve losing valuable information. In this research analysis visual cryptography is utilized to enhance website authentication mechanisms so that when a user visits a website, the system automatically compares the visual cryptographic shares from the legitimate server and the client’s browser. By integrating this cryptographic technique, the ML model helps better identify these attacks before any loss occurs by making it difficult for attackers. The primary objective of this study is to integrate visual cryptography with machine learning so that predictions are better. Index Terms - Phishing attacks, visual cryptography, machine learning.
APA, Harvard, Vancouver, ISO, and other styles
26

Gopal, S. V. V. D. Venu, Didde Keerthika, Mavuri Rajasri, Vanapalli Bhavani, and Chinnala SatyaUma. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43560.

Full text
Abstract:
Phishing attacks are one of the most common attacks where the attacker tries to steal sensitive information of one individual like user names, passwords, credit card numbers, or other personal data, by manipulating the user by behaving as a legitimate request. These attacks are considered a threat as they involve losing valuable information. In this research analysis visual cryptography is utilized to enhance website authentication mechanisms so that when a user visits a website, the system automatically compares the visual cryptographic shares from the legitimate server and the client’s browser. By integrating this cryptographic technique, the ML model helps better identify these attacks before any loss occurs by making it difficult for attackers. The primary objective of this study is to integrate visual cryptography with machine learning so that predictions are better. Index Terms - Phishing attacks, visual cryptography, machine learning.
APA, Harvard, Vancouver, ISO, and other styles
27

Bharati A. Patil, Prajakta R. Toke, and Sharyu S. Naiknavare. "Research on Various Cryptography Techniques." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 685–92. http://dx.doi.org/10.32628/cseit2410290.

Full text
Abstract:
Cryptography is utilized to make secure data transmission over networks. The algorithm called for cryptography should meet the conditions of authentication, confidentiality, integrity and non-repudiation. Cryptography is a technique used from decenniums to secure and forfend the information and send the data from one place to another without the trepidation of having been read out by some unauthorized and unauthenticated denotes. Several ways has been developed in this field to make the information more secure and evade trespassing. However these methods may have some loopholes or shortcoming which leads to the leakage of information and thus raising a question of information security. The cryptographic technique is utilized not only to provide the security but additionally it deals with data integrity, confidentiality and non-repudiation issues. To safeguard data during transmission or storage, sundry algorithms and methods have been developed in the field of security. A wide range of cryptography approaches are employed, each with its own set of strengths and inhibitions that are acclimated to provide data security. Cryptography can be defined as techniques that cipher data, depending on categorical algorithms that make the data unreadable to the human ocular perceiver unless decrypted by algorithms that are predefined by the sender. It encrypts data utilizing a set of algorithms such as symmetric and asymmetric algorithms. These encryption methods vary in terms of vitality, celerity, and utilization of resources (CPU utilization, recollection, and power). It is utilized to bulwark personal identifiable information (PII) and other confidential data, authenticate identities, avert document tampering, and build trust between servers. Cryptography is one of the most paramount techniques utilized by digital businesses to safeguard the systems that store their most valuable asset – data – whether it is at rest or in kinetic Customer PII, employee PII, perspicacious property, company strategies, and any other confidential information are examples of data. As a result, cryptography is a vital infrastructure, as the aegis of sensitive data increasingly relies on cryptographic solutions. In this paper I have discussed various cryptographic techniques and the inhibitions of those techniques as well. Some cryptographic algorithms are briefly described and their impact on the information is additionally mentioned.
APA, Harvard, Vancouver, ISO, and other styles
28

Mmaduekwe, Ugochukwu, and Ebuka Mmaduekwe. "Cybersecurity and Cryptography: The New Era of Quantum Computing." Current Journal of Applied Science and Technology 43, no. 5 (2024): 41–51. http://dx.doi.org/10.9734/cjast/2024/v43i54377.

Full text
Abstract:
Aim: This paper aims to examine the concepts of cybersecurity and cryptography with the advent of the current quantum computing. Significance of Study: The numerous advantages attached to the use of the hyper-connected paradigm have given an inestimable and unavoidable value to its use. However, there is a need to protect information dissemination between parties to avoid the occurrence of catastrophic events that may come when an unauthorized party accesses this information. Thus, the use of quantum computing to improve the previously used cryptography for cybersecurity is very essential. Problem Statement: In the past, cryptography was the adopted method to secure information in the cyber world thereby, preventing attack and also disallowing intruders from having access to secret information. However, the advent of quantum computing to improve the efficiency of cryptography has made its application very challenging due to its complex nature. Discussion: An introduction to cryptography, cyber security, and quantum computing was executed. The mechanisms of cryptography in cyber security together with its transition into quantum cryptography were discussed. Characteristics of quantum information and quantum communication systems regarding typical examples were stated. Post-quantum cryptography as a means of handling the challenges accorded with the use of quantum cryptography was discussed. Finally, consideration was given to the development and applications of the SWOT framework for various kinds of cryptographic algorithms. Conclusion: The use of quantum cryptography has found wide applications in cybersecurity. Also, post-quantum cryptography has been proven to be effective in handling issues arising from the use of quantum cryptography in securing information from being accessed by a third party.
APA, Harvard, Vancouver, ISO, and other styles
29

Donia Fadil Chalob, Rusul Hussein Hasan, and Suaad M. Saber. "A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 1 (2025): 275–82. https://doi.org/10.32628/ijsrset25121171.

Full text
Abstract:
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capability and small size, while highlighting the requirement for study in the post-quantum cryptographic field to address the threats rising from quantum computing. The comparative analysis shows a comprehensive understanding that combines classical cryptography algorithms with up-to-date approaches such as chaotic-based system and post-quantum cryptography, confirming that the study addresses the future of cryptography security in the aspect of emerging challenge like quantum computing.
APA, Harvard, Vancouver, ISO, and other styles
30

Qian, Yuling. "Application of modern algebra in cryptography." Theoretical and Natural Science 10, no. 1 (2023): 16–20. http://dx.doi.org/10.54254/2753-8818/10/20230304.

Full text
Abstract:
With the rapid development of the digital age, information security, from personal data to national security, is becoming increasingly crucial. Information security primarily refers to the computation and processing of diverse information in computer systems and information exchange networks in order to safeguard information security. Cryptography is the technical foundation for achieving these objectives. In the early stages of education, advanced mathematics, linear algebra, probability theory, and other fundamental disciplines must be studied, although the practical application of modern algebra, cryptography, number theory, and mathematical knowledge will vary. This study explores the application of current algebra in cryptography, including both traditional and modern cryptographic applications, using a literature review approach. By comparing images from various eras, the researchers discovered that images were classed as "traditional" and "modern" at various times. Moreover, the likelihood of both traditional and modern images being identified throughout the modern era is comparatively higher.
APA, Harvard, Vancouver, ISO, and other styles
31

Satapure, Pratiksha. "Different Methods of Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 170–77. http://dx.doi.org/10.22214/ijraset.2021.38732.

Full text
Abstract:
Abstract: Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vital information in a secret way. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, nonrepudiation. The security of communication is a crucial issue on World Wide Web. It is about confidentiality, integrity, authentication during access or editing of confidential internal documents. Keywords: Cryptography, Hill Cipher, Homophonic Substitution Cipher, Monoalphabetic Cipher, Ceaser Cipher.
APA, Harvard, Vancouver, ISO, and other styles
32

Santosh, Mutnuru. "New Research Articles 2020 June Issue International Journal on Cryptography and Information Security (IJCIS)." International Journal on Cryptography and Information Security ( IJCIS) 10, no. 2 (2020): 1–7. https://doi.org/10.5281/zenodo.3925261.

Full text
Abstract:
<strong>International Journal on Cryptography and Information Security ( IJCIS)</strong>&nbsp;is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.
APA, Harvard, Vancouver, ISO, and other styles
33

Shahid, Ishaq, and Raj Rashmi. "Analyzing and Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 171–75. https://doi.org/10.5281/zenodo.3892475.

Full text
Abstract:
Wireless Sensor Networks are gaining popularity in various fields and areas. But these nodes are vulnerable as they are open networks and easily accessible. The major challenge is to have a secure data transmission between the nodes. To establish a secure transmission, we require a security scheme like a cryptographic algorithm, but this also requires a secure key distribution between nodes. The WSN&acirc;&euro;&trade;s have constraints like limited area, power and memory which restrict all the categories of cryptographic algorithm. Depending upon the criteria&acirc;&euro;&trade;s and constraints, cryptographic algorithm like Elliptic Curve Cryptography ECC is best suitable for WSN&acirc;&euro;&trade;s environment. ECC has a smaller key size, high security and less computation time which makes the node an efficient crypto system. In order to protect the security of data, we propose a novel secure transmission strategy based on Cryptography. In this design, we acquire sensitive information securely so as to make use of the advantage of encryption. Our approach deal with the weakness of limitation in sensor node resources and the security threats, it is suitable for stream data in sensor nodes. The simulation experiments also demonstrate that this approach is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility. This paper describes the implementation of ECC cryptosystem for WSN for secure key and data transmission between the nodes. Shahid Ishaq | Rashmi Raj &quot;Analyzing &amp; Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30328.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30328/analyzing-and-securing-data-transmission-in-wireless-sensor-networks-through-cryptography-techniques/shahid-ishaq
APA, Harvard, Vancouver, ISO, and other styles
34

Kumar, Dr Vinod, Er Gagandeep Raheja, and Ms Subeena Sareen. "CRYPTOGRAPHY." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (2013): 29–32. http://dx.doi.org/10.24297/ijct.v4i1a.3030.

Full text
Abstract:
To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting information by transforming it into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable. Database security policies are guidelines for present and future decisions regarding the maintenance of the database security. Database security mechanisms are the functions used to enforce the database security policies. There are number of security policies that can be applied on data in order to protect the data against unauthorized access. Protecting the data is the prime need of an organization.
APA, Harvard, Vancouver, ISO, and other styles
35

Hafiz Nanda Ginting, Subhan, Muhammad Rhifky Wayahdi, and Surya Guntur. "Playfair Cipher Algorithm in Learning Media." Jurnal Minfo Polgan 11, no. 1 (2022): 9–14. http://dx.doi.org/10.33395/jmp.v11i1.11560.

Full text
Abstract:
The level of security and confidentiality of information / data becomes very important in the era of increasingly sophisticated and developing technology. Cryptographic methods can be one solution to overcome problems in the level of security and confidentiality of information. However, knowledge about cryptography is still a lot of audiences who do not know and understand its use in securing the secrets of information, for that we need an application which presents a learning media that is expected to help provide knowledge from cryptography. This study implements a learning media application that discusses a Playfair Cipher classic cryptographic method, a cryptographic technique that encrypts bigrams using a matrix table consisting of 25 letters in it, text that can be encrypted in the form of alphabet letters on the system that has been tested. The results of the encryption and decryption of the text do not have spaces or symbols in it, the application of playfair cipher cryptographic learning media is aimed at computer students as a tool to better understand the playfair cipher cryptographic material.
APA, Harvard, Vancouver, ISO, and other styles
36

Nadia Mustaqim Ansari, Talha Tariq, Rizwan Iqbal, Azhar Abbas, Haider Abbas, and Muhammad Mohsan Zohaib. "QUANTUM CRYPTOGRAPHY: SECURING DATA IN THE POST-QUANTUM COMPUTING ERA – A COMPREHENSIVE EXPLORATION OF THE FUTURE OF CYBERSECURITY." Kashf Journal of Multidisciplinary Research 2, no. 02 (2025): 28–43. https://doi.org/10.71146/kjmr259.

Full text
Abstract:
Classical cryptographic systems face a hazardous situation because quantum computing operates as a threat vector against classical systems through Shor's and Grover's algorithms. Through Shor's algorithm factoring large integers results in a breach of RSA encryption methods whereas Grover's algorithm enables substantially quicker searches of unsorted databases to diminish symmetric key encryption strength. The advanced features of quantum systems eliminate the foundation of security that classical cryptographic techniques depend on computation complexity for protection. Quantum Key Distribution (QKD) under the principles of quantum mechanics presents an effective solution through quantum cryptography for achieving secure communication. QKD stands apart from classical systems through its complete security because attempts at quantum channel interception automatically disable transmitted information and notifies sender and receiver. The successful deployment of quantum cryptography needs solutions for its high implementation expenses coupled with noise sensitivity along with scalability limitations. The research shows it is vital to actively implement quantum-resistant cryptography now because it will protect sensitive data as the post-quantum computing period begins thus securing global cyberspace infrastructure protection systems. The study demonstrates both promising speed benefits of Hash-Based cryptography but Code-Based cryptography encounters deployment barriers because of its performance restrictions. Future studies must focus on performance development of PQC mechanisms to boost operational speed and sustain security standards.
APA, Harvard, Vancouver, ISO, and other styles
37

Anilkumar, Chunduru, Bhavani Gorle, and Kinthali Sowmya. "A Secure Method of Communication in Conventional Cryptography using Quantum Key Distribution." Applied and Computational Engineering 8, no. 1 (2023): 68–73. http://dx.doi.org/10.54254/2755-2721/8/20230083.

Full text
Abstract:
Security knowledge is one of the foremost challenges in the present day. When the topic is about Information security, the concept of cryptography comes into the picture. Every day, people and organizations use cryptography to maintain the confidentiality of their communications and data as well as to preserve their privacy. Today, one of the most successful methods used by businesses to protect their storage systems, whether at rest or in transit, is cryptography. Yet, cryptography is an effective technique to secure the data, the modern technology can break the cryptographic techniques. But some data encryption algorithms are several times stronger than today's conventional cryptography and can be constructed using quantum computing. They are "Quantum Cryptographic Algorithms ". Quantum cryptography uses the rules of quantum physics instead of classical encryption, which is based on mathematics, to protect and transmit data in a way that cannot be intercepted. Quantum key distribution is the greatest illustration of quantum cryptography and offers a safe solution to the key exchange issue. The proposed work deals with quantum cryptography and mainly focuses on how the quantum cryptographic algorithm is more secure than traditional cryptography.
APA, Harvard, Vancouver, ISO, and other styles
38

Himmat Rathore. "Next-generation cryptographic techniques for robust network security." World Journal of Advanced Research and Reviews 11, no. 3 (2021): 496–508. https://doi.org/10.30574/wjarr.2021.11.3.0413.

Full text
Abstract:
Cryptography is a key enabling tool in digital security that is needed to protect information, secure communication, and ensure the integrity between connected networks. As cybersecurity threats continue to emerge constantly and, as evidenced by APTs, ransomware, and, later, quantum cyber threats, the need for stronger, more modern generations of cryptographic methods is more urgent than ever. Therefore, this paper seeks to discuss the emerging trends in the most recent cryptographic advancements including post quantum cryptography, homomorphic cryptography and security paradigms leveraging on blockchain system. These techniques are equally effective in correcting significant limitations of existing systems and in improving their overall efficiency and rates. The coursework points out the inherent weaknesses of traditional cryptographic solutions, such as the exposure to quantum computing threat models and their ability to address current and future security needs. Through a brief discussion of the theoretical background and practical implementations, this paper aims to assess the efficiency of the latest cryptographic technologies in strengthening network security measures. Research insights show that using third-generation cryptographic approaches is far more effective in protecting information from new risks. Besides, applying these methods in essential industries, including finance, healthcare, and IoT, supports the practical utilization of these methods. Based on the findings of this research, these innovations should be adopted to secure digital structure in a growing complex environment.
APA, Harvard, Vancouver, ISO, and other styles
39

Budi, Sarwo, Arif Budimansyah Purba, and Jajang Mulyana. "PENGAMANAN FILE DOKUMEN MENGGUNAKAN KOMBINASI METODE SUBTITUSI DAN VIGENERE CIPHER." ILKOM Jurnal Ilmiah 11, no. 3 (2019): 222–30. http://dx.doi.org/10.33096/ilkom.v11i3.477.222-230.

Full text
Abstract:
Cryptography is a method of securing data using algorithms that have been developed continuously until now. Cryptography offers security in the form of data confidentiality, for example the confidentiality of data generated through encryption algorithms that scrambles personal information so that it cannot be read or solved by unauthorized parties. One of them is the substitution algorithm and the vigenere cipher is a classic method used for data security. The combination of these algorithm methods becomes a solution for double security as file protection. By using a cryptographic application for data security, the combination of the two method algorithms produces a data file that provides more security to the text file so that it is not easy and difficult to solve.
APA, Harvard, Vancouver, ISO, and other styles
40

BERESTNEV, MIKHAIL, ALEXEY MINBALEEV, and KIRILL EVSIKOV. "ENSURING INFORMATION SECURITY OF MINING EQUIPMENT IN THE QUANTUM ERA." News of the Tula state university. Sciences of Earth 1, no. 1 (2023): 567–84. http://dx.doi.org/10.46689/2218-5194-2023-1-1-567-584.

Full text
Abstract:
The article considers the expediency of changing the methods of ensuring information security of automated process control systems (automated process control systems) of extractive industry enterprises. The analysis of foreign experience allowed us to say that the world's leading economies are preparing for the appearance of a cryptographically relevant quantum computer. Many countries have adopted mandatory and recommendatory documents on the transfer of critical information infrastructure to quantum-secure methods of information protection: quantum key distribution or post-quantum cryptography. Both of these methods have their advantages and disadvantages, which must be taken into account when implementing the automated process control system. The analysis shows that post-quantum cryptography, although it requires less economic costs to improve cryptographic information protection systems, but the cryptographic stability of these algorithms is conditionally secure. The study allows us to conclude that it is advisable to recommend quantum key distribution systems for use in the extractive industry...
APA, Harvard, Vancouver, ISO, and other styles
41

Raut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.

Full text
Abstract:
Abstract: The internet has revolutionized advancements, it’s conveniences and uses come at the price of new perils. To be safe from being the victim of fraud, theft and other damage security and vigilance is critical. Cryptography plays an important role in securing information and communications using a set of rules, it ensures the integrity of our data. It maintains confidentiality by protecting the privacy of personal information stored in enterprise systems. Hence Encryption is the only way to ensure that your information remains secure while it is stored and being transmitted. Cryptographic Algorithms mathematically maintain the integrity, confidentiality and authenticity of sensitive information by preventing data disclosure, data tampering and repudiation. The three main types of cryptography are Symmetric Key Cryptography, Asymmetric Key Cryptography and Hash Functions. In this Paper, several important algorithms used for encryption and decryption are defined and analysed, the algorithms are DES, AES, ECC, RSA, MD5 Keywords: Cryptography, Encryption, Decryption, AES, DES, ECC, RSA, Blowfish, MD5
APA, Harvard, Vancouver, ISO, and other styles
42

Kabeaken, Syariah, and Imam Saputra. "Perancangan Aplikasi Enkripsi Pada File Teks Menggunakan Algoritma Spritz." JURIKOM (Jurnal Riset Komputer) 7, no. 3 (2020): 353. http://dx.doi.org/10.30865/jurikom.v7i3.2125.

Full text
Abstract:
The security of a file is a matter of concern in maintaining the confidentiality of information, especially those containing information that only the authorized parties may know about. Sending files or information without security will risk tapping and the information contained therein, can be easily known by unauthorized parties. One important thing in maintaining the confidentiality and security of files is the encryption process. Then based on techniques in cryptography, one of the methods that will be used in securing text files with the Spritz algorithm. Modern cryptography is more trusted by scientists than classical cryptography because it has a good level of security. Classical cryptography only does randomization from A-Z while modern cryptography operates in bit mode. The modern algorithm used is the Spritz algorithm. The Spritz algorithm is a variant of the RC4 algorithm, the security level of the Spritz algorithm is better than RC4
APA, Harvard, Vancouver, ISO, and other styles
43

Nanda, Nanda Amalya, Santa Maria Sopiana Silalahi, Della Fatricia Nasution, Melia Sari, and Indra Gunawan. "Kriptografi dan Penerapannya Dalam Sistem Keamanan Data." Jurnal Media Informatika 4, no. 2 (2023): 90–93. http://dx.doi.org/10.55338/jumin.v4i2.428.

Full text
Abstract:
An understanding of what cryptography is, to understand cryptography and how it is applied in data security, so that data will be safer and more protected from spamming or illegal hacking of information. Observations of cryptography and its application to data security are carried out using the Approach of Literary Studies. Library Studies is a data collection technique by studying various reference books and the results of previous similar research, which is useful for obtaining a theoretical foundation on the problem to be studied. Cryptography is a technique of conveying messages in a hidden manner by utilizing data encryption features, which serve to secure data, whether transferred through a computer network or not, which is very useful for protecting, privacy, data integrity, authentication, and non-repudiation. Nowadays the use of cryptography has begun to be widely used in everyday life. Use cryptographic systems for the security of your data when accessing information.
APA, Harvard, Vancouver, ISO, and other styles
44

Dandy Duggari Manik and Ramos Somya. "DESIGNING 64-BIT BLOCK CIPHER CRYPTOGRAPHY BASED ON THE PATTERN OF ONE OF KARO'S TRADITIONAL CLOTHS." Jurnal Teknik Informatika (Jutif) 5, no. 4 (2024): 157–61. https://doi.org/10.52436/1.jutif.2024.5.4.2137.

Full text
Abstract:
The ease of access to information technology in the modern era can be felt in various aspects of human life needs, one of which is exchanging information or exchanging data is an activity that has been carried out very often every day. With this convenience, the security and confidentiality of the data is also very important to consider because the information or data exchanged can contain important or confidential matters. In the exchange of data or information, of course, a security system is needed that ensures the data remains safe. One of the techniques to secure this data is to use cryptographic techniques. There have been many cryptographic techniques used or implemented to secure information, but many cryptographic techniques have been solved so that the ability to secure data is doubtful. One way to overcome this is to create a new cryptography or make changes to existing cryptography. Through this research, a cryptography will be created that uses the pattern of Karo traditional cloth and uses a 64-bit Block Cipher to produce a better encryption process.
APA, Harvard, Vancouver, ISO, and other styles
45

Dayo Alowolodu, Olufunso, Gabriel K Adelaja, Boniface K Alese, and Olufunke Catherine Olayemi. "Medical Image Security Using Quantum Cryptography." Issues in Informing Science and Information Technology 15 (2018): 057–67. http://dx.doi.org/10.28945/4008.

Full text
Abstract:
Aim/Purpose: Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. Background: One of the best ways to which medical image could be kept secured is through the use of quantum cryptography Methodology : Applying the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured network communication infrastructure. This enables two legitimate users to produce a shared secret random bit string, which can be used as a key in cryptographic applications, such as message encryption and authentication. Contribution: This paper can make it possible for the healthcare and medical professions to construct cryptographic communication systems to keep patients’ transferred data safe and secured. Findings: This work has been able to provide a way for two authorized users who are in different locations to securely establish a secret network key and to detect if eavesdropping (a fraudulent or disruption in the network) has occurred Recommendations for Practitioners: This security mechanism is recommended for healthcare providers and practitioners to ensure the privacy of patients’ medical information. Recommendation for Researchers: This paper opens a new chapter in secured medical records Impact on Society Quantum key distribution promises network security based on the fundamental laws of quantum mechanics by solving the problems of secret-key cryptography . Future Research: The use of post-quantum cryptography can be further researched.
APA, Harvard, Vancouver, ISO, and other styles
46

Akram, Zaryab. "Cryptology Based on Laplace Transform of Hyperbolic Function and Matrix Decomposition Method." ECS Meeting Abstracts MA2022-02, no. 64 (2022): 2364. http://dx.doi.org/10.1149/ma2022-02642364mtgabs.

Full text
Abstract:
Cryptography is the art of coding and decoding the communication. Cryptography ensures the security of delicate information over some confidentiality breaching resources. In the recent age Cryptography has turned into a battleground of some of the world’s best mathematicians and computer scientists. A number of transforms like Sumudu transform, Laplace transform, Fourier transform, Kamal transform, Mellin transform, Jafari transform, Aboodh transform, N-transform, ELzaki transform, MAHGOUB transform are frequently used in cryptography. Cryptography is of great importance in every field of life including data transmission, data storage, E-Commerce, confidential communication such as credit card transactions and Emails. Cryptography has been a hot topic among the researchers from 4000 years ago until now. In this work, a new cryptographic technique will be introduced. . In this work mathematical transformation known as Laplace transform on hyperbolic function is used for advancement of security purpose in the field of computers and telecommunications, this concept is known as Cryptography. This work includes a mathematical method known as “Laplace Transform” along with “Matrix Decomposition or Triangularization method” in cryptographic process (Encryption and Decryption). Both these mathematical concepts are used in this work to create a new cryptographic technique for the security of data and information in the world of computer. In this technique, Laplace transform on hyperbolic functions along with Matrix decomposition method will be incorporated. The Laplace Transform of hyperbolic function and Lower Triangular Matrix will be used as encryption and inverse Laplace Transformand upper triangular matrix will be used for decryption. Furthermore, the technique will also be explained with its applications.
APA, Harvard, Vancouver, ISO, and other styles
47

Singhal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani, and Amit Sharma. "Database Security using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.

Full text
Abstract:
Abstract: There has been an explosion in data since last two decades and this explosion of data is due to high rates of data conversion and better internet services worldwide [21]. All the conventional methods of data handling have been replaced by much more sophisticated means. One of the typical shifts of the emerging information society is that information is becoming a crucial if not the most vital source. Information contrasts profoundly from further resources; for example and it can be imitative without cost, it can be erased without leaving traces. [22] Protecting the new resource information is a major issue in the information economy [20]. One such means is a Database. It makes it easier for data related queries butit can be dangerous if this data is leaked or sent outside the organization. A high price is positioned on confidentiality when information concerning statesecrets, business plans, war strategy, medical recordsand financial transactions needs to be stored or transmitted. Since its inception, the Internet has enable [19]. A cyber crime emerging in recent years data breachis one of the most notorious and disastrous data crimes majorly caused due to unsecure database. To secure these databases we can apply the concepts of AES algorithm. It is an algorithm used in cryptographywhich changes normal text to unreadable or cypher text. Keywords: Cryptography, AES, cypher, digitzation, confidentiality
APA, Harvard, Vancouver, ISO, and other styles
48

Widiarsana, Made Ari, I. Gusti Ngurah Anom Cahyadi Putra, I. Ketut Gede Suhartana, Luh Gede Astuti, I. Putu Gede Hendra Suputra, and I. Wayan Supriana. "Aplikasi Website Pengamanan File Dokumen Menggunakan Kriptografi RSA." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 11, no. 1 (2022): 33. http://dx.doi.org/10.24843/jlk.2022.v11.i01.p04.

Full text
Abstract:
Data security is something that needs to be considered in maintaining the confidentiality of information, especially those that only contain information that can be known by the authorized party. There are still many cases of data leakage that occur in Indonesia, especially in documents. Documents can be secured using cryptographic techniques. One of the well-known cryptography is RSA Cryptography. The security of RSA cryptography lies in the difficulty of factoring large numbers into prime factors. The implementation of RSA cryptography will be made using the python programming language based on the website. The system created has a success rate of 100% in encrypting documents for each document, and in decrypting it has a success rate of 85% to 96%.
APA, Harvard, Vancouver, ISO, and other styles
49

Dhea Agustina Akmal, Dicha Mutia Dhani, and Febby Syahila. "Kombinasi Kriptografi Modern Dalam Keamanan Pesan Teks." Saturnus : Jurnal Teknologi dan Sistem Informasi 2, no. 3 (2024): 119–28. http://dx.doi.org/10.61132/saturnus.v2i3.204.

Full text
Abstract:
In the rapidly advancing digital era, information security has become a crucial aspect in maintaining the confidentiality, integrity, and authenticity of data. This article discusses the relationship between information system auditing and the use of modern cryptographic combinations in securing text messages. Information system auditing serves as an evaluation mechanism to ensure that security policies, procedures, and standards are correctly and consistently applied. On the other hand, modern cryptography provides advanced encryption technology that protects text messages from unauthorized access and manipulation. By combining these two approaches, we can create a robust framework for securing text messages, ensuring that data remains safe and protected during transmission and storage. Research results indicate that integrating information system auditing with modern cryptographic techniques significantly enhances the security and reliability of information systems.
APA, Harvard, Vancouver, ISO, and other styles
50

Ms., A. A. Deshmukh, Manali Dubal Ms., Mahesh TR Dr., and C. R. Chauhan Mr. "DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD." International Journal of Advanced Information Technology (IJAIT) 2, no. 2 (2012): 41–57. https://doi.org/10.5281/zenodo.3534867.

Full text
Abstract:
Smart cards improve the convenience and security of any transaction. They provide tamper-proof storage of user and account identity. Multifunction cards are used to manage network system access, store value and other data. The cards carry personal account, credit and buying-preference information and thus, security becomes a primary issue here. Public Key Cryptography plays an essential role in electronic banking and financial transactions. ECC is one of the best public key techniques for its small key size, high security and is suitable for secure access of smart cards. This article gives principles of public key cryptography, illustrates two cryptographic algorithms RSA and ECC. The elliptic curve cryptography is implemented on smart card using Menezes-Vanstone Elliptic Curve Cryptosystem and Nyberg-Rueppel Signature Scheme [2]. The implementation of these algorithms is done using Java Card technology. The test results are analysed and comparison about the public key sizes and security aspects are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography