cryptography ieee paper 2019



Cryptography is the science of secret writing with the intention of keeping the data secret. Cryptanalysis, on the other hand, is the science or sometimes the art of breaking cryptosystems. These both terms are a subset of what is called as Cryptology

Notes on Primality Testing And Public Key Cryptography Part 1: Randomized Algorithms Miller Rabin and Solovay Strassen Tests
free download

Prime numbers have fascinated mathematicians and more generally curious minds for thousands of years. What is a prime number Well, 2, 3, 5, 7, 11, 13,, 9973 are prime numbers. The defining property of a prime number p is that it is a positive integer p≥ 2 that

Genus two isogeny cryptography
free download

We study (l, l)-isogeny graphs of principally polarised super singular abelian surfaces (PPSSAS). The (l, l)-isogeny graph has cycles of small length that can be used to break the collision resistance assumption of the genus two isogeny hash function suggested by

Generalized Visual Cryptography Scheme with Completely Random Shares
free download

ABSTRACT A modification of the standard Naor-Shamir scheme for visual cryptography and visual secret sharing is proposed. Better statistical properties of shares are obtained at the cost of the slightly worse quality of reconstructed images. Advantages and disadvantages of

A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages
free download

Steganography and cryptography are very important techniques used in A cryptographic key generation scheme for multilevel data security
free download

In 1982, and Taylor proposed an elegant solution to rhe partially ordered multilevel key distribution problem, using a cryptographic approach. Since then, continuing research has been conducred to try to realize and simplify their scheme. Generally speaking, there are

Towards achieving data security with the cloud computing adoption framework.
free download

Offering real-time data security for petabytes of data is important for Cloud Computing. A recent survey on cloud security states that the security of users data has the highest priority as well as concern. We believe this can only be able to achieve with an approach that is

Data security model for cloud computing
free download

With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security . With the analysis of HDFS architecture, we get the data security requirement of cloud

Data security in cloud computing with elliptic curve cryptography
free download

Cloud computing is one of todays hottest research areas due to its ability to reduce costs associated with computing while increasing scalability and flexibility for computing services. Cloud computing is Internet based computing due to shared resources, software and the protection of data from accidental or malicious modification, destruction, or disclosure (FIPS); the science and study of methods of protecting data in computer and communications systems against unauthorized disclosure, transfer, delay, modifications, or

Privacy and Data Security Risks in Cloud Computing.
free download

In recent years, cloud computing has emerged as one of the fastest-growing segments of the information technology industry. The ability to leverage economies of scale, geographic distribution,

Robust data security for cloud while using third party auditor
free download

Cloud computing has been envisioned as the next-generation technology of IT industries. The Cloud is a platform where data owner remotely store their data in the cloud to enjoy the high quality applications and services. The client or data owner send their data to data

Enhancing data security using video steganography
free download

Information security has become the area of concern as a result of widespread use of communication medium over the internet. This paper focuses on the data security approach when combined with encryption and steganographic techniques for secret communication
to hide and secure secret messages in transmitted data. This paper will introduce, implement and test a novel methodology which can be used as a secure and highly efficient method of

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography
free download

With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreoverby the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms

Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process
free download

Abstract The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public competition-like process. The new publickey cryptography standards will specify one or more additional digital

ID-Based Cryptography and Remote Data Checking for Secure Cloud Data Storage
free download

The massive technological advancements in world exchange and the necessity for individual information to cross global outskirts featured the need to characterize security arrangements and propose unequivocal controls to upgrade the insurance of natives up

Semiring Actions for Public Key Cryptography
free download

Novel and Efficient Visual Cryptography scheme for privacy protection
free download

Both the hashing and the encryption / decryption keys are generated from the user claimed ID, using a modified password-based key driven algorithm. Askari, N., et. al (2012, April). In this paper, a novel visual secret sharing scheme is proposed without image size expansionThe Conference on Selected Areas in Cryptography (SAC) is the leading Canadian venue for the presentation and publication of cryptographic research, and has been held annually since 1994. SAC celebrated its 25th anniversary in 2018, taking place for the second time at

Visual Cryptography using half toned images
free download

With an exponentially increasing pile of information dumped across the World Wide Web, securing private and public information has never been more imperative. Over the years, encryption techniques have evolved to include many steps with multiple calculationsThe use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general

A study on Role and Applications of Cryptography Techniques in Cloud Computing (Cloud Cryptography )
free download

Cloud Computing refers to controlling, arranging, and getting to the equipment and programming assets remotely. It offers online data storage, infrastructure, and applications. Cloud Computing gives customers a virtual computing environment on which they can store

SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY
free download

The mapping or strap of IP addresses to host names became a major problem in the rapidly growing Internet and the higher level binding effort went through different stages of development up to the currently used Domain Name System (DNS). The DNS Security is

RD Trends and Future Prospects of Quantum Cryptography
free download

2. Quantum cryptography Cryptosystems based on mathematical algorithms such as RSA and elliptic curve cryptography are currently in widespread use throughout society. But although they are extremely easy to use, they are at risk of being broken by future

CRYPTOGRAPHY : THE CASE OF CRYPTOGRAPHIC DESIGN IN ASP .NET
free download

This paper discusses about how cryptography is misused in the security design of a large part of the Web. The web application framework developed by Microsoft powers 25% of all Internet web sites. The attackers can abuse multiple cryptographic design flaws to

Hardware Components for Post-Quantum Elliptic Curves Cryptography
free download

Investigations in the sphere of quantum calculations form up new challenges in the public key cryptography . Currently known public key crypto algorithms may be compromised with the implementation of quantum computers. The workgroups of ETSI and NIST determined





FREE IEEE PAPER