Increasing the security of transmitted text messages using chaotic key and image key cryptography [PDF]
It is critical to safeguard confidential data, especially secret and private messages. This study introduces a novel data cryptography approach. The new approach will be capable of encrypting and decrypting any communication size.
Mua’ad Abu-Faraj+4 more
doaj +2 more sources
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain
The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet.
Asia Ali Salman Al-karkhi+2 more
openalex +3 more sources
Function Codes for Protection of Key in Private Key Cryptography [PDF]
In order to check the applicability and correctness of any designed algorithm, it is must to write a code on any suitable platform that successfully implements the logic. The present work is actually an extension to what we have done in our previous works where we have tried to devise an algorithm which is based on the most popular and largely applied ...
Ashish Agarwal+4 more
openalex +2 more sources
Enhanced Key Protection in Private Key Cryptography
: The adventurous ventures of technology have proved to be the reason(s) to consistently work in the orientation that lands you in the new domain acquiring its foundation in the existing frameworks.
A. Agarwal
openaire +3 more sources
A Decentralized Signcryption Scheme Based on CFL [PDF]
The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no.
Leyi Shi, Mengting Liu
doaj +2 more sources
Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation
Rainbow is one of the most important signature schemes in multivariate public key cryptography. It enjoys a strong security guarantee and is a promising signature scheme in Post-Quantum Cryptography. However, it suffers from large key size. In this paper,
Zhiniang Peng, Shaohua Tang
doaj +2 more sources
Privately Generated Key Pairs for Post Quantum Cryptography in a Distributed Network
In the proposed protocol, a trusted entity interacts with the terminal device of each user to verify the legitimacy of the public keys without having access to the private keys that are generated and kept totally secret by the user. The protocol introduces challenge–response–pair mechanisms enabling the generation, distribution, and verification of ...
Mahafujul Alam+2 more
openalex +3 more sources
Enhancing IoT security with a DNA-based lightweight cryptography system [PDF]
The rapid increase of internet of things (IoT) devices in our daily lives has highlighted the critical need for strong security measures to protect the integrity and confidentiality of IoT communications.
Sehrish Aqeel+4 more
doaj +2 more sources
Dual-band complex-amplitude metasurface empowered high security cryptography with ultra-massive encodable patterns [PDF]
The significance of a cryptograph method lies in its ability to provide high fidelity, high security, and large capacity. The emergence of metasurface-empowered cryptography offers a promising alternative due to its unparalleled wavefront modulation ...
Gu Zhen+9 more
doaj +2 more sources
Secure, Image based Private Key for Secret Message Cryptography
Ziad Alqadi+2 more
openalex +2 more sources