A Security at Its Finest: Overview of Cryptography Mechanisms

نویسندگان

  • Awrad Mohammed Ali
  • Neslisah Torosdagli
  • Josiah Wong
چکیده

Cryptography is the field of science which aims to construct systems that can withstand any abuse. The systems are designed in such a way that, even under malicious attacks, the systems can perform their functionalities without any security issues and without revealing any secret information [Goldreich 2004]. Cryptography has been an important field even centuries before modern computers. However, after widespread usage of Internet, it has become an important aspect of our daily life, because personal information such as user names, passwords, credit card information etc. which are required to use modern systems needs to be secure. In this research, we surveyed several papers ranging from classical to more recent ones which become milestones in this field. This paper basically addresses fundamental techniques that have been used in this field, and their applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving security of double random phase encoding with chaos theory using fractal images

This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...

متن کامل

Cryptography in OpenBSD: An Overview

Cryptographic mechanisms are an important se curity component of an operating system in secur ing the system itself and its communication paths Indeed in many situations cryptography is the only tool that can solve a particular problem e g network level security While cryptography by it self does not guarantee security when applied cor rectly it can signi cantly improve overall security Since o...

متن کامل

VANETs: Security Challenges and Future Directions

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the n...

متن کامل

EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016