A Security at Its Finest: Overview of Cryptography Mechanisms
نویسندگان
چکیده
Cryptography is the field of science which aims to construct systems that can withstand any abuse. The systems are designed in such a way that, even under malicious attacks, the systems can perform their functionalities without any security issues and without revealing any secret information [Goldreich 2004]. Cryptography has been an important field even centuries before modern computers. However, after widespread usage of Internet, it has become an important aspect of our daily life, because personal information such as user names, passwords, credit card information etc. which are required to use modern systems needs to be secure. In this research, we surveyed several papers ranging from classical to more recent ones which become milestones in this field. This paper basically addresses fundamental techniques that have been used in this field, and their applications.
منابع مشابه
Improving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملCryptography in OpenBSD: An Overview
Cryptographic mechanisms are an important se curity component of an operating system in secur ing the system itself and its communication paths Indeed in many situations cryptography is the only tool that can solve a particular problem e g network level security While cryptography by it self does not guarantee security when applied cor rectly it can signi cantly improve overall security Since o...
متن کاملVANETs: Security Challenges and Future Directions
Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the n...
متن کاملEEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...
متن کاملOverview of Intrusion Detection Techniques in Database
Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...
متن کامل