50,209 research outputs found

    A Comprehensive Study on Crypto-Algorithms

    Get PDF
    In the field of computer network and security, cryptography plays a vital role for secure data transmission as it follows the principle of data confidentiality, integrity, non-repudiation, authentication. By using several cryptographic algorithms, a user can deliver and receive the message in more convenient way. In this paper, we have collaborated on various cryptographic algorithms, several types of cryptographic techniques along with different types of security attacks prevailing in case of cryptography. During the exchanging of any sort of information, the key generation, encryption and decryption processes are examined in more details in the current paper. We have discussed regarding RSA (Ron Rives, Adi Shamir and Len Adelman), which is one of the most secure algorithm in the context of data and information sharing, that has been analysed clearly in our work along with the basic concepts of DES(Data Encryption Standard) , conventional encryption model, ECC(Elliptic curve cryptography), Digital signature, ABE(Attribute based Encryption), KP-ABE(Key policy Attribute based encryption), CP-ABE(Ciphertext policy attribute based encryption), IBE(Identity based Encryption). We have elaborated various cryptograhic concepts for keeping the message confidential and secure while considering secured data communication in case of networks

    Confidential Data Aggregation in Wireless Sensor Networks Using Coding Theory

    Get PDF
    Wireless sensor networks are recently receiving substantial attention due to their unlimited potency. The data aggregation scheme provides better security as cluster head perform aggregation on cipher text directly without decryption, accordingly transmission overhead is reduced. We propose the aggregation scheme based on coding theory. McEliece public key encryption based on coding is providing the best alternate for cryptosystem. They leverage error correcting codes as a mechanism for encryption. Different from RSA and ELGAMAL, quantum computer cannot break the McEliece public key cryptosystem and here encryption and decryption operations are more efficient and even secure against chosen cipher text attacks

    Image Encryption using AES Encryption Technique with Bernoulli Chaotic Map

    Get PDF
    In last few years, the progress in communication technology has seen strong interest in digital picture or image transmission. However, computer processor growth in possessing power and storage illegal access has become easier. Encryption method involves some special mathematical algorithms and keys to transform digital data into cipher text or code before they are transmitted and decrypted method involves the application of mathematical algorithms and keys to obtain the original data from cipher text or code, scientific community have seen strong interest in image transmission. However, illegal image or data access has become more easy and established in wireless and general communication networks. Information privacy becomes a difficult issue. In order to protect, secure your valuable image or data from unauthorized readers, data or image encryption or decryption is essential, furthermore. As such in this paper, AES based on encryption has been proposed for secure image transmission over channels

    Using quantum key distribution for cryptographic purposes: a survey

    Full text link
    The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8
    corecore