Novel Hybrid Public/Private Key Cryptography Based on Perfect Gaussian Integer Sequences [PDF]
IEEE Access, 2021This paper proposes a novel hybrid public/private key cryptography scheme based on perfect Gaussian integer sequences (PGISs) of period $N=pq$ . First, a review study of construction degree-4 PGIS is addressed.
Ching-Hsien Hsia+3 more
doaj +5 more sources
A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography [PDF]
Symmetry, 2022Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process.
Mua’ad Abu-Faraj+2 more
doaj +4 more sources
Forward-Security in Private-Key Cryptography [PDF]
The Cryptographer's Track at RSA Conference, 2002This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure.
A. Desai+14 more
core +6 more sources
PROTECTION OF KEY IN PRIVATE KEY CRYPTOGRAPHY. [PDF]
International Journal of Advanced Research, 2017Neha Tyagi, Ashish Agarwal, Anurag Katiyar, Shubham Garg and Shudhanshu Yadav G.L. Bajaj Institute of Technology & Management, Plot 2, Knowledge Park 3, Greater Noida, Distt. Gautam Budh Nagar, Uttar Pradesh, India.
Neha Tyagi+4 more
semanticscholar +4 more sources
COMPARATIVE STUDY OF PRIVATE AND PUBLIC KEY CRYPTOGRAPHY ALGORITHMS: A SURVEY [PDF]
International Journal of Research in Engineering and Technology, 2014Internet has revolutionized many aspects of our daily lives. Nowadays Internet is used for millions of applications. Many people depend on Internet for several activities like on-line banking, on-line shopping, on-line learning and on-line meetings etc. Huge amount of data travels over the network. Security of data over the network is a critical issue.
Priti Bali .
semanticscholar +3 more sources
A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes
Journal of Software Engineering and Applications, 2017Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visual cryptography is splitting the secret image into shares such that when the shares are stacked, the secret image is revealed.
Rola Al-Khalid+4 more
semanticscholar +5 more sources
Methods for Protection of Key in Private Key Cryptography [PDF]
International Journal of Innovative Research in Computer Science & Technology, 2017Neha Tyagi+4 more
semanticscholar +4 more sources
Public-Key Cryptography Standards (PKCS) #8: Private-Key Information Syntax Specification Version 1.2 [PDF]
Request for Comments, 2008This document represents a republication of PKCS #8 v1.2 from RSA Laboratories' Public Key Cryptography Standard (PKCS) series. Change control is transferred to the IETF. The body of this document, except for the security considerations section, is taken
B. Kaliski
semanticscholar +3 more sources
On the Impossibility of Private Key Cryptography with Weakly Random Keys [PDF]
Annual International Cryptology Conference, 2007The properties of weak sources of randomness have been investigated in many contexts and using several models of weakly random behaviour. For two such models, developed by Santha and Vazirani, and Chor and Goldreich, it is known that the output from one such source cannot be "compressed" to produce nearly random bits.
James McInnes, Benny Pinkas
semanticscholar +4 more sources
Enhanced Key Protection in Private Key Cryptography
International Journal for Research in Applied Science and Engineering Technology, 2017: The adventurous ventures of technology have proved to be the reason(s) to consistently work in the orientation that lands you in the new domain acquiring its foundation in the existing frameworks.
Ashish Agarwal
semanticscholar +4 more sources