Staying up-to-date with cryptology
نویسنده
چکیده
This paper provides an overview of current cryptographic techniques, targeting management and focussing on applicability of cryptographic tools and on the level of their security. The paper shows real-life examples and latest developments in the area. It also brings recommendations that should help managers to understand the necessary basics, what is really important and how to manage cryptology.
منابع مشابه
Overview of Key Agreement Protocols
The emphasis of this paper is to focus on key agreement. To this aim, we address a selfcontained, up-to-date presentation of key agreement protocols at high level. We have attempted to provide a brief but fairly complete survey of all these schemes.
متن کاملThe Effect of Replacing Barley with Ground Date Seeds on the Performance of Growing Male Goats
This study was conducted to investigate the effect of replacing barley with different levels of ground date seeds (GDS) in the diet (0, 15, 3o and 45%) on performance of local growing male goats. Sixteen local male kids (average live weight 16.1±1.41 kg) were allocated randomly to four treatments (4 animal/treatment). The trial consisted of a 14 day acclimatization period followed by a 60-day m...
متن کاملStill Wrong Use of Pairings in Cryptography
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies. There have been however a wide range of incorrect use of these primitives. The paper of Galbraith, Paterson, and Smart (2006) pointed out most of t...
متن کاملGroup-theoretic orbit decidability
A recent collection of papers in the last years have given a renovated interest to the notion of orbit decidability. This is a new quite general algorithmic notion, connecting with several classical results, and closely related to the study of the conjugacy problem for extensions of groups. In the present survey we explain several of the classical results closely related to this concept, and we...
متن کاملCryptographic Hash Functions: Recent Design Trends and Security Notions
Recent years have witnessed an exceptional research interest in cryptographic hash functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the U.S. National Institute of Standards and Technology (NIST) has also significantly boosted this interest by announcing a public competition to select the next hash function standard, to be named SHA-3. Not surprisingly, the...
متن کامل