Since the arrival of devices connected to the Internet, cryptographic goals have become a constant challenge for cybersecurity specialists. Data transmitted between IoT devices can become sensitive depending on the ap...
详细信息
All digital information exchange is not free from security threats in terms of information exchange, so a technique or method is needed to make message exchange in today's all-digital era safer. Therefore, this re...
详细信息
R-Ate pair is an important bilinear mapping in state secret SM9 cryptographic algorithm, and its computational efficiency is closely related to the implementation performance of SM9. This scheme uses variable-length M...
详细信息
An end-to-end encrypted chatting application focuses on securely transmitting sensitive information. It prevents the intrusion of malicious parties with any ill intent. It is especially needed in organizations where e...
详细信息
The paper describes the construction of nonlinear cryptographic protocol, based on separate linear cryptosystems. Implementation of suggested construction scheme enables encryption of data blocks with ready-made and p...
详细信息
Today, hashing algorithms are employed in many applications for security purposes. Many developments have been made in the family of hashing algorithms, especially the SHA1 algorithm. Because of flaws in the past year...
详细信息
Due to the advent of polynomial time quantum algorithms to solve well-known hard mathematical problems, various secure cryptographic primitives are vulnerable against large quantum computers. However, no such quantum ...
详细信息
Quantum cryptography is a field of study that explores the use of quantum mechanics to create new cryptographic techniques that are more secure than traditional cryptography. With the advancement of quantum computing ...
详细信息
ISBN:
(纸本)9798350361513;9798350372304
Quantum cryptography is a field of study that explores the use of quantum mechanics to create new cryptographic techniques that are more secure than traditional cryptography. With the advancement of quantum computing technology, the security of many commonly used encryption algorithms is at risk. Quantum cryptography offers a potential solution to this problem by providing a method for secure communication based on the principles of quantum mechanics. In this paper, we will provide an overview of the fundamental concepts of quantum mechanics, their relevance to cryptography, and the most widely used quantum cryptography protocol, Quantum Key Distribution. The paper also examines the security and limitations of Quantum Key Distribution. The paper concludes with a summary of findings and implications for the future of cryptography and information security.
Since the existing DNA encryption algorithms only have fixed DNA coding and decoding rules and a single algorithm that cannot meet more complex and more secure encryption requirements, an image encryption algorithm ba...
详细信息
Since the existing DNA encryption algorithms only have fixed DNA coding and decoding rules and a single algorithm that cannot meet more complex and more secure encryption requirements, an image encryption algorithm based on hyperchaotic system and dynamic DNA coding is proposed. The algorithm proposes two new operation methods in the DNA operation rules, namely the equal-additive column transformation and the equal-subtractive column transformation. which combine the SHA-256 function and the external key to generate the initial value of the chaotic system to ensure that key and plaintext of algorithm are correlated. In the encryption process, the plaintext image is firstly converted into a two-dimensional matrix for rotation and scrambling. Then the chaotic sequence generated by the hyperchaotic Chen system is used to perform DNA dynamic encoding, decoding and operation on the scrambled matrix and block matrix generated by logistic chaotic sequence. Finally, the encrypted matrix is scrambled in one dimension. Simulation results show that the improved encryption algorithm has a larger key space, breaks the strong correlation between image pixel layers, and can effectively resist multiple attacks.
Each new image cryptosystem aims to achieve improved security results, with entropy being one of the primary measures for quantifying its security. For 8-bit images, the ideal entropy value is 8.0. However, various en...
详细信息
暂无评论