Results 91 to 100 of about 30,889 (254)

Cryptanalysis of Polyalphabetic Cipher Using Differential Evolution Algorithm

open access: yesTehnički Vjesnik, 2020
Today it is necessary to keep information secure and cryptography is the most common technique for data security. The Vigenere cipher, one of the polyalphabetic encryption algorithms, has been used in the history by substitution of the plaintext letters
Arkan Kh Shakr Sabonchi, Bahriye Akay
doaj   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Quantum Differential Cryptanalysis [PDF]

open access: yesarXiv, 2018
In this paper, we propose a quantum version of the differential cryptanalysis which offers a quadratic speedup over the existing classical one and show the quantum circuit implementing it. The quantum differential cryptanalysis is based on the quantum minimum/maximum-finding algorithm, where the values to be compared and filtered are obtained by ...
arxiv  

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

open access: yes, 2007
With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them
Hong, Choong Seon, Pathan, Al-Sakib Khan
core   +1 more source

Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems

open access: yesJournal of Critical Infrastructure Policy, Volume 5, Issue 2, Page 88-110, Fall/Winter 2024.
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer   +5 more
wiley   +1 more source

Security analysis of an encryption scheme based on nonpositional polynomial notations

open access: yesOpen Engineering, 2016
The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (
Kapalova Nursulu   +1 more
doaj   +1 more source

Contravening Esotery: Cryptanalysis of Knapsack Cipher using Genetic Algorithms [PDF]

open access: yesarXiv, 2016
Cryptanalysis of knapsack cipher is a fascinating problem which has eluded the computing fraternity for decades. However, in most of the cases either the time complexity of the proposed algorithm is colossal or an insufficient number of samples have been taken for verification.
arxiv  

Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 6, November/December 2024.
Abstract Vehicular ad‐hoc networks (VANETs) support features like comfort, safety, and infotainment, enhancing traffic efficiency. However, traditional VANETs struggle with dynamic and large‐scale networks due to fixed policies and complex architectures, such as constantly changing vehicle positions.
Adi El‐Dalahmeh   +3 more
wiley   +1 more source

Cryptanalysis of some protocols using matrices over group rings [PDF]

open access: yesarXiv, 2015
We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm problem on (semi) groups of matrices over a group ring. We can find the secret key and break entirely the protocols.
arxiv  

Implementation of entropically secure encryption: Securing personal health data

open access: yesElectronics Letters, Volume 60, Issue 22, November 2024.
We present the first implementation of entropically secure encryption (ESE) for bulk encryption. For this goal we have implemented a faster binary polynomial multiplication algorithm which is the main bottleneck for ESE. We have used x‐ray images and human genome data to assess our implementation's performance.
Mehmet Hüseyin Temel   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy