CRYPTOGRAPHY IEEE PAPERS AND PROJECTS-2020



Cryptography or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós “hidden, secret”; and γράφειν graphein, “to write”, or -λογία -logia, “study”, respectively) is the practice and study of techniques for secure communication in the presence of third parties called adversaries.



Entanglement-based secure quantum cryptography over 120 kilometres
free download

Abstract Quantum key distribution (QKD) 3 is a theoretically secure way of sharing secret keys between remote users. It has been demonstrated in a laboratory over a coiled optical fibre up to 404 kilometres long 7. In the field, point-to-point QKD has been

Ancient Egyptian Cryptography : Graphic Hermeneutics
free download

Beginning modestly during the Old Kingdom and continuing to the end of the hieroglyphic tradition, the ancient Egyptian script made use of alternative signs and atypical phonetic values and meanings for more commonly used signs. Texts employing these non-standard

Status report on the second round of the nist post-quantum cryptography standardization process
free download

Abstract The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public, competition-like process. The new publickey cryptography standards will specify one or more additional digital

Identification of attackers using blockchain transactions using cryptography methods
free download

Blockchain is inventive approach to manage taking care of information, executing trades, performing limits, and working up trust in an open space. Many consider square chain as an advancement accomplishment for cryptography and digital security, with use cases going

RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography .
free download

Empowering electronic devices to support Post-Quantum Cryptography (PQC) is a challenging task. Compared with traditional cryptography PQC introduces new mathematical elements and operations which are usually not easy to implement on standardAbstract In Internet of Things (IoT), the massive connectivity of devices and enormous data on the air have made information susceptible to different type of attacks. Cryptographic algorithms are used to provide confidentiality and maintain the integrity of the information

Fast polynomial inversion for post quantum QC-MDPC cryptography .
free download

The NIST PQC standardization project evaluates multiple new designs for post-quantum Key Encapsulation Mechanisms (KEMs). Some of them present challenging tradeoffs between communication bandwidth and computational overheads. An interesting case is the set of

Assembly or Optimized C for Lightweight Cryptography on RISC-V
free download

A major challenge when applying cryptography on constrained environments is the trade-off between performance and security. In this work, we analyzed different strategies for the optimization of several candidates of NISTs lightweight cryptography standardization project

Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA.
free download

This paper presents a set of efficient and parameterized hardware accelerators that target post-quantum lattice-based cryptographic schemes, including a versatile cSHAKE core, a binary-search CDT-based Gaussian sampler, and a pipelined NTT-based polynomial

Securing Network-on-Chip Using Incremental Cryptography
free download

Network-on-chip (NoC) has become the standard communication fabric for on-chip components in modern System-on-chip (SoC) designs. Since NoC has visibility to all communications in the SoC, it has been one of the primary targets for security attacks. While

Quantum Cryptography for Nuclear Command and Control
free download

The nuclear inventory of Russia and the USA currently comprises 1 685 warheads in a large network of vehicles; and the interconnected network is managed by a command and control communication system. This command and control communication system (C3) must

Symmetric Cryptography
free download

This report documents the program and the outcomes of Dagstuhl Seminar 20041 Symmetric Cryptography . The seminar was held on January 19-2 in Schloss Dagstuhl Leibniz Center for Informatics. This was the seventh seminar in the series

Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software
free download

Performance in hardware has typically played a major role in differentiating among leading candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic contests (Rijndael in case of AES and Keccak in case of SHA-3) were ranked consistentlyThe goal of the secret sharing is to share a secret information without any leakage to others. In this paper, we proposed a secure mechanism of sharing secret shares of an image between two parties generated via Shamirs scheme with the help of neural cryptography

Review on secured data capabilities of cryptography steganography, and watermarking domain
free download

Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The

Profiling Cryptography Developers
free download

Profiling developer expertise on the internet can provide valuable information for a multitude of applications such as recruiting. Studies have shown that it is feasible to track and profile developer activity on various platforms,(eg, Stack Overflow and GitHub). Furthermore Internet of things (IoT) has become a new era of communication technology for performing information exchange. With the immense increment of usage of smart devices, IoT services become more accessible. To perform secure transmission of data between IoT network andWe prove that the teleportation-based quantum cryptography protocol presented in Gordon and Rigolin (Opt Commun 283: 18 2010), which is built using only orthogonal states encoding the classical bits that are teleported from Alice to Bob, is asymptotically secureAbstract Information security broadly refers to the state of protection against unsanctioned access to information or data, principally electronic or digital data. In todays world of modern technology, there is a need to design and develop security measures to protect information

A comparative study of symmetric cryptography mechanism on DES, AES and EB64 for information security
free download

The usages of Information technology were numerous in every aspect of life. As it were, an adequate security has often been a great challenge which has to be more focused on. Different methods have been employed to secure and protect the shared and sensitive data Visual cryptography (VC) is a new form of secret sharing technique, where no computation is needed for decryption. The decryption can be done by stacking the shares or simple OR/XOR operations. This type of crypto-system is especially attractive for computation

Cryptography Core Technology
free download

In this chapter, we describe the analysis of security basis. One is the analysis of elliptic curve discrete logarithm problem (ECDLP). ECDLP is one of the public-key cryptosystems that can achieve a short key size but it is not a post-quantum cryptosystem. Another is analysis to

Vulnerabilities in Public Key Cryptography
free download

Cryptography plays a vital role in securing data for IT infrastructure by enabling an adequate level of security to the business. The increased significance of security in the IT infrastructure has raised the demand for public key cryptography . Public key cryptography eliminates the

Using the Moore-Penrose Generalized Inverse in Cryptography
free download

In this work, we introduce a new method in cryptography . It is using the Moore-Penrose generalized inverse of a rectangular matrix to the cryptographic system. We use a rectangular matrix which has the Moore-Penrose generalized inverse as a key. We mean The 12th Conference on Security and Cryptography for Networks (SCN 2020) was held as a virtual event during September 14 1 2020. The conference has traditionally been held in Amalfi, with the exception of the 5th edition, held in the nearby town of Maiori. After the This paper constitutes the second part of a paper published in Barthe et al.(J Autom Reason, 2017. https://doi. org/10.1007/s10817-017-9441-5). Cache-based attacks are a class of side- channel attacks that are particularly effective in virtualized or cloud-based environments

Cryptography Techniques
free download

Page 1. Cryptography By Asst.Professor Amruta Navale Dr.DYPatil SCS College,Akurdi,Pune- 44 Page 2. By Asst.Professor Amruta Navale Dr.DYPatil SCS College,Akurdi,Pune-44The pre-fix crypt means that hidden and therefore the suffix graphy stands for writing. A

HYBRID QUANTUM CRYPTOGRAPHY SCHEME TO ENHANCE THE SECURITY IN DIGILOCKER
free download

Cryptography is a widely used technique to provide security in large networks. Classical cryptography and quantum cryptography are Two widely used techniques are Classical cryptography and quantum cryptography . Classical cryptography uses simple mathematicalSince the advent of the internet, our world has become more and more connected every day. The International Telecommunications Union reports [19] that the number of internet users has increased from 400 million in to 3.2 billion in 2015. This growth rate is expected to

High-Assurance Cryptography in the Spectre Era
free download

High-assurance cryptography leverages methods from program verification and cryptography engineering to deliver efficient cryptographic software with machine-checked proofs of memory safety, functional correctness, cryptographic security, and side-channel

Quantum Cryptography : from Key Distribution to Conference Key Agreement
free download

Recent years have seen major advancements in the field of quantum cryptography and particularly in quantum key distribution (QKD). A QKD protocol enables two parties to generate a shared secret key via an insecure quantum channel and an authenticated public

Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography
free download

This paper explores methods through which secret information is encrypted then and hided so as to increase the level of security in medical health data from being hacked [19]. This is done through combining two method Elliptic curve cryptography and image steganography

On the Deployment of curve based cryptography for the Internet of Things.
free download

The typical battery supported IoT computing node has progressed in recent years from an 8- bit processor with limited memory resources, to a 32-bit processor with ample amounts of ROM and RAM. This is a game-changer for developers who no longer need to struggle with The time and space optimization, protecting data loss and safeguarding privacy as well as integrity are the priorities in any large file transmission system. However, the current literature is lacking to provide such a system which can take care of each of these aspects This book has been developed from notes that I wrote for a course on algorithms and hardware architectures for computer arithmetic. The course was a broad one covering the usual areas of fixed-point arithmetic, floating-point arithmetic, elementary functions, and so

Reviewing latest developments in Elliptical Curve Cryptography
free download

This Elliptical curve cryptography (ECC) depends on an open key cryptosystem that is on elliptic curve hypothesis. ECC needs littler keys in contrast with non-EC cryptography to give proportional security. Elliptic curves have different applications in pseudo-arbitrary The chapter Marlowe: Implementing and Analysing Financial Contracts on Blockchain is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons. org/licenses/by/4.0/). For further details see license information in Routing and secure communication are important concerns in Delay Tolerant Networks (DTNs). Previously designed security schemes utilize traditional public key cryptosystems for entity and data security that provide security under some hard problems like integer

Image Steganography based Cryptography
free download

The privacy and security of data is of utmost importance to individuals whose critical data can be leaked out and used for illegal purposes. The data needs to be secure and precautions needs to be taken whenever it gets transmitted from one place to another. In the

Caesar Cipher With Goldbach Code Compression For Efficient Cryptography
free download

This paper proposes an enhancement on the traditional Caesar cipher by introducing the concept of compression using the Goldbach code algorithm to conceal the ciphertext generated by the Caesar cipher for added security. The Caesar cipher is one of the early We are pleased to present the proceedings of the 18th International Conference on Applied Cryptography and Network Security (ACNS 2020). ACNS was planned to be held in Rome, Italy, during June 22 2 2020. Due to the unexpected covid crisis, we first

A STUDY OF LIGHTWEIGHT CRYPTOGRAPHY
free download

Technology is evolving rapidly and with technology, the internet is also changing. People used to use internet to connect to each other. But with the changes in recent years, the internet is starting to be used more to connect devices to each other. These devices can

Quantum Cryptography : Security for the Post-Quantum world
free download

The predictions of quantum computing potential puts the worlds classical cryptography at risk of exploitation. Cryptographic protocols are used extensively on the World Wide Web. The Rivest Shamir Adleman (RSA) protocol is just one public-key cryptosystem at risk, as it

Light Weight Cryptography for Secure Data Transmission
free download

ABSTRACT Vehicular Ad Hoc Networks (VANETs) is an imperative communication paradigm in recent mobile computing for transferring message for either condition, road conditions. A protected data can be transmitted through VANET, LEACH protocol based Visual cryptography is generally based on the base matrix scheme or the random grid scheme. These schemes cause some problems, such as the expansion of the shares and the recovered images and the distortion of the recovered images. In this paper, we

Cryptography Based on DNA Analysis
free download

Secure data transmission is a challenging and fundamental aspect nowadays. Secure and nonvulnerable transmission of authenticated data is ensured by using cryptography and steganography methods. Advancement in technology leads to a new cryptographic

Compressed sensing in cryptography
free download

Compressed sensing (CS) is a new signal processing technique, it allows the signal to be sampled at a rate much lower than the Shannon-Nyquist rate, and allows to sample and compress in one step using the sparsity of signal that can represent a signal with fewer Security breaches have been observed in different dimensions in mobile payment system. The violation of users privacy is a common phenomenon in mobile payment transactions. This study presents an improved security scheme for a mobile payment system using elliptic

Schemes and Applications of Visual Cryptography
free download

Visual cryptography is a form of encryption which is applied on images and all visual information such as handwritten data, signatures, financial documents etc. Here the data is encoded into unidentifiable format and to decrypt the encoded message no algorithm in

A Survey of CryptographyBased Authentication for Smart Grid Communication⋆
free download

The adoption of new means of communication in the form of internet-based communication, power line communication, wireless communication and other communication protocols have allowed smart grids many additional functionalities over traditional power grid systems

Visual CryptographyA Secure Medium
free download

Secret information is main topic focused in systems used for communication an effective and secure protection is through encrypting the data. The data must be protected from being tampered by any process going on within the systems. Encryption of data is one of the Security of information put away and handled on the open cloud is a noteworthy concern. In this paper we contend that hybrid cloud gives a perfect situation to applications that require the participation of different associations, every association needs to facilitate a few parts of

Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography
free download

Dear editor, The security of cryptographic techniques heavily relies on the confidentiality of the key, and everything except keys can be made open to public without affecting security. When working with cryptographic services, we must protect the keys from a variety of

Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption.
free download

Medical image contains sensitive information of patients. In order to improve the efficiency and security of medical image encryption, we propose an improved elliptic curve cryptography by combining with homomorphic encryption in this paper. Traditional elliptic

Authentication Scheme Based On Blow Fish Cryptography In Categorized Sensor Networks
free download

In categorized sensor network deployment, many applications uses different sensor nodes and communicate with sensor nodes. In WSN peer-to-peer sensor network consists of hundreds to several thousand sensor nodes connect locally with neighboring nodes and

A Hardware Implementation for Code-based Post-quantum Asymmetric Cryptography .
free download

This paper presents a dedicated hardware implementation of the LEDAcrypt cryptosystem, which uses Quasi-Cyclic Low-Density Parity-Check codes and a decoding algorithm known as Q-decoder for the decryption function. The designed architecture is synthesized for both

TO IMPROVE WORKING OF DIGITAL SIGNATURE USING PUBLIC KEY CRYPTOGRAPHY
free download

Public-key cryptography is quickly turning into a base for line commerce and various functions that require security and authentication in an open network. Full-size use of public- key cryptography requires a public-key infrastructure to submit and control public-key Most of recent researches carried out into wireless sensor networks are concerned with homogeneous networks in which all network nodes have the same features and key management mechanisms presented for them aim to enable as many nodes to establish The original version of the chapter was inadvertently published without two authors and their affiliation in the chapter opening page, which have now been included. The correction chapter has been updated with the change. Pooja Kashyap, Binita Rai, Sikkim Manipal

Two WPT Levels Decomposition for Color Image Cryptography
free download

Digital color image is one of the most important types of data used due to the large number of computerized applications that are needed for mankind. The importance of digital color image force use to seek a good method of cryptography to protect the image from any