In the ever-evolving field of cybersecurity, randomness plays a critical role in cryptographic systems. Traditional pseudo-random number generators, while widely used, can be vulnerable to attacks due to their determi...
详细信息
Due to the significant advancement in quantum computational capability, there has been a race to develop algorithms capable of withstanding attacks stemming from this emerging technology. In response to this need, the...
详细信息
The increase in information technologies has generated the need to implement new methodologies to secure the exchange of information. This paper proposes a cryptographic algorithm based on the use of quantum different...
详细信息
The smart grid has now been fully implemented with a robust defense system that is built on the primary security principles of "security zoning, network specialization, horizontal isolation, and vertical authenti...
详细信息
This paper analyzes the time complexity of attacks on the RSA cryptosystem by focusing on the factoring of the modulus n. The RSA algorithm is widely used for secure data transmission, and its security relies on the c...
详细信息
This paper presents the novel hybrid encryption algorithm based on the combination of strength of Advanced encryption Standard and Rivest Cipher 4. The substitution- permutation network of AES provides a strong basis ...
详细信息
Side channel attacks, and in particular timing attacks, are a fundamental obstacle to obtaining secure implementation of algorithms and cryptographic protocols, and have been widely researched for decades. While crypt...
详细信息
Cryptography is a bedrock of IoT security, and elliptic curve cryptography (ECC) has been recognized as a potential option due to its effectiveness and robust security qualities. The heterogeneous nature of IoT deploy...
详细信息
In this paper, we propose a histogram publication algorithm HP-SDP (histogram publication with shuffled differential privacy) for the existing histogram publication methods, which is difficult to effectively balance t...
详细信息
In this paper, we discuss the challenges of quantum computing to traditional cryptography and the latest development of post-quantum cryptography as a coping strategy. As quantum computing advances, cryptographic algo...
详细信息
暂无评论