Cryptanalysis of Polyalphabetic Cipher Using Differential Evolution Algorithm
Today it is necessary to keep information secure and cryptography is the most common technique for data security. The Vigenere cipher, one of the polyalphabetic encryption algorithms, has been used in the history by substitution of the plaintext letters
Arkan Kh Shakr Sabonchi, Bahriye Akay
doaj +1 more source
Quantum blockchain: Trends, technologies, and future directions
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S+15 more
wiley +1 more source
Quantum Differential Cryptanalysis [PDF]
In this paper, we propose a quantum version of the differential cryptanalysis which offers a quadratic speedup over the existing classical one and show the quantum circuit implementing it. The quantum differential cryptanalysis is based on the quantum minimum/maximum-finding algorithm, where the values to be compared and filtered are obtained by ...
arxiv
An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards
With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them
Hong, Choong Seon, Pathan, Al-Sakib Khan
core +1 more source
Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer+5 more
wiley +1 more source
Security analysis of an encryption scheme based on nonpositional polynomial notations
The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (
Kapalova Nursulu+1 more
doaj +1 more source
Contravening Esotery: Cryptanalysis of Knapsack Cipher using Genetic Algorithms [PDF]
Cryptanalysis of knapsack cipher is a fascinating problem which has eluded the computing fraternity for decades. However, in most of the cases either the time complexity of the proposed algorithm is colossal or an insufficient number of samples have been taken for verification.
arxiv
Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis
Abstract Vehicular ad‐hoc networks (VANETs) support features like comfort, safety, and infotainment, enhancing traffic efficiency. However, traditional VANETs struggle with dynamic and large‐scale networks due to fixed policies and complex architectures, such as constantly changing vehicle positions.
Adi El‐Dalahmeh+3 more
wiley +1 more source
Cryptanalysis of some protocols using matrices over group rings [PDF]
We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm problem on (semi) groups of matrices over a group ring. We can find the secret key and break entirely the protocols.
arxiv
Implementation of entropically secure encryption: Securing personal health data
We present the first implementation of entropically secure encryption (ESE) for bulk encryption. For this goal we have implemented a faster binary polynomial multiplication algorithm which is the main bottleneck for ESE. We have used x‐ray images and human genome data to assess our implementation's performance.
Mehmet Hüseyin Temel+2 more
wiley +1 more source