Advanced Cryptography Term Papers CSCI-762, Spring 2020

Choosing a topic, first step, due february 10 (mon), second step, february 25 (tue), third step, march 31 (tue) and april 2 (thu), fourth step, presentations, late april/early may, final papers due wednesday, may 6, subjects/presentations/papers from spring 2020.

Open Access is an initiative that aims to make scientific research freely available to all. To date our community has made over 100 million downloads. It’s based on principles of collaboration, unobstructed discovery, and, most importantly, scientific progression. As PhD students, we found it difficult to access the research we needed, so we decided to create a new Open Access publisher that levels the playing field for scientists across the world. How? By making research easy to access, and puts the academic needs of the researchers before the business interests of publishers.

We are a community of more than 103,000 authors and editors from 3,291 institutions spanning 160 countries, including Nobel Prize winners and some of the world’s most-cited researchers. Publishing on IntechOpen allows authors to earn citations and find new collaborators, meaning more people see your work not only from your own field of study, but from other related fields too.

Brief introduction to this section that descibes Open Access especially from an IntechOpen perspective

Want to get in touch? Contact our London head office or media team here

Our team is growing all the time, so we’re always on the lookout for smart people who want to help us reshape the world of scientific publishing.

Home > Books > Biometrics and Cryptography

Perspective Chapter: Cryptography – Recent Advances and Research Perspectives

Submitted: 06 May 2023 Reviewed: 15 May 2023 Published: 27 December 2023

DOI: 10.5772/intechopen.111847

Cite this chapter

There are two ways to cite this chapter:

From the Edited Volume

Biometrics and Cryptography

Edited by Sudhakar Radhakrishnan and Carlos M. Travieso-González

To purchase hard copies of this book, please contact the representative in India: CBS Publishers & Distributors Pvt. Ltd. www.cbspd.com | [email protected]

Chapter metrics overview

88 Chapter Downloads

Impact of this chapter

Total Chapter Downloads on intechopen.com

IntechOpen

Total Chapter Views on intechopen.com

Cryptography is considered as a branch of both mathematics and computer science, and it is related closely to information security. This chapter explores the earliest known cryptographic methods, including the scytale, Caesar cipher, substitution ciphers, and transposition ciphers. Also, explains the evolution of these methods over time. The development of symmetric and asymmetric key cryptography, hash functions, and digital signatures is also discussed. The chapter highlights major historical events and technological advancements that have driven the need for stronger and more efficient encryption methods. In addition, the chapter explores the potential for integrating artificial intelligence tools with cryptographic algorithms and the future of encryption technology.

  • cryptography
  • mathematics
  • computer science
  • information security
  • Caesar cipher
  • substitution ciphers
  • transposition ciphers
  • symmetric key cryptography
  • asymmetric key cryptography
  • hash functions
  • digital signatures
  • historical events
  • technological advancements
  • artificial intelligence

Author Information

Monther tarawneh *.

  • Computer Science Department, Isra University, Amman, Jordan

*Address all correspondence to: [email protected]

1. Introduction

Cryptography is the science converting information into an unreadable format as a practice of protecting confidential messages from unauthorized access [ 1 ]. Cryptographic algorithms have come a long way since the early days of cryptography and have evolved to keep up with the changing technological landscape. In this chapter, we will explore the history of cryptographic algorithms and their evolution over time.

The earliest known cryptographic methods date back to ancient civilizations, where methods, such as simple substitution and transposition ciphers, were used to conceal messages and prevent non-authorized people from understanding messages. These methods evolved over time to include more complex ciphers, such as the Caesar cipher and the Vigenère cipher, which were used during the Middle Ages. The development of the printing press and the subsequent increase in literacy rates led to the need for more secure methods of encryption, which led to the development of more complex ciphers such as the Playfair cipher and the Enigma machine.

Symmetric key cryptography is one of the oldest and most widely used types of encryption. It is based on the concept of using the same key to encrypt and decrypt a message. The history of symmetric key algorithms dates back to ancient times, where simple substitution ciphers were used to encrypt messages. Over time, more complex algorithms were developed such as the Hill cipher and the data encryption standard (DES). The development of the advanced encryption standard (AES) in the late twentieth century marked a significant improvement in symmetric key cryptography as it provided stronger encryption and faster processing times.

Asymmetric key cryptography, also known as public-key cryptography, is a more recent development in the field of cryptography. It is based on the use of two different keys—a public key and a private key—to encrypt and decrypt messages. The concept of asymmetric key cryptography was first introduced by Whitfield Diffie and Martin Hellman in 1976 [ 2 ]. This led to the development of various algorithms such as the Rivest-Shamir-Adleman (RSA) algorithm [ 3 ] and the Diffie-Hellman key exchange [ 4 ].

Hash functions are another important component of modern-day encryption. A hash function is a mathematical function that takes an input (or message) and produces a fixed-length output (or hash) [ 5 ]. Hash functions are used to ensure the integrity of data as any change to the original input will result in a different hash. The history of hash functions dates back to the 1950s, where the concept of message digests was introduced. Over time, more complex algorithms were developed such as the secure hash algorithm (SHA) and the message digest (MD) [ 5 , 6 ].

Digital signatures are used to provide authentication and non-repudiation in digital communications. A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. The history of digital signature algorithms dates back to the early 1980s, where the concept of public-key cryptography was first introduced. Over time, various algorithms were developed such as the digital signature algorithm (DSA) and the elliptic curve digital signature algorithm (ECDSA) [ 7 ].

The evolution of cryptographic algorithms has been driven by major historical events and technological advancements. With the advent of the internet and the increase in digital communication, the need for stronger and more efficient encryption methods became more pressing. As computing power continues to increase, the potential for cracking encryption algorithms also increases. This has led to the need for stronger and more advanced cryptographic algorithms, such as post-quantum cryptography, which can withstand attacks from quantum computers.

In addition to the potential threats to encryption technology, there is also the potential for integrating artificial intelligence tools with cryptographic algorithms. For example, machine learning algorithms could be used to identify potential vulnerabilities in encryption systems and improve their security.

As the digital landscape continues to evolve, the importance of staying ahead of the curve in encryption technology cannot be overstated. This chapter provides an overview of the history and evolution of cryptographic algorithms, highlighting the need for ongoing innovation and development in this field. By continuing to push the boundaries of encryption technology, we can help to safeguard the privacy and security of sensitive data in the digital age.

Encryption is a critical component of modern communication and information security [ 8 ]. By converting data into a secure format that can only be accessed with the correct key or password, encryption ensures that sensitive information is protected from unauthorized access. Throughout history, cryptography has played a significant role in the security of sensitive information from the early substitution ciphers used by ancient civilizations to the modern public-key encryption algorithms.

Recent developments in technology have led to new challenges and opportunities in the field of cryptography. The rise of quantum computing [ 9 ], blockchain technology [ 10 ], and the need for secure communication in an increasingly connected world have all driven new research and innovation in the field of cryptography [ 11 ].

This chapter provides an overview of various cryptographic techniques, including symmetric and asymmetric encryption, hashing, digital signatures, homomorphic encryption, multiparty computation, and lightweight cryptography. Each of these techniques has its own strengths and weaknesses and is suited to different use cases and scenarios. The chapter also explores the future of cryptography, including developments in post-quantum cryptography, blockchain-based cryptography, and other emerging technologies. By understanding the principles and applications of modern cryptography, we can better protect our digital assets and maintain the privacy and security of our communication.

2. Ancient cryptography methods

The history of cryptography dates back to ancient civilizations, where people used various methods to protect their messages from unauthorized access. The earliest examples of cryptography being used to protect information were found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in Egypt [ 12 , 13 ]. The inscription, known as the “Cryptography Inscription,” described a method for hiding the meaning of hieroglyphic inscriptions by using symbols to represent individual letters. The symbols were then scrambled in a specific way to make the text difficult to read. The main purpose of the “Cryptography Inscription” was not to hide the message but rather to change its form in a way that would make it appear dignified. While the symbols used in the inscription were scrambled, they were still readable by those who were familiar with the method of substitution used. It means that the inscription was intended for a specific audience who were already familiar with the method rather than as a means of keeping the message secret from all who might view it.

2.1 Substitution cipher

Monoalphabetic substitution: a basic cryptography method where each character of the plaintext is replaced with a corresponding character of cipher text. The same substitute symbol or letter is used every time a particular plaintext letter appears. For example, if “A” is substituted with “D,” every “A” in the plaintext will be replaced with “D” in the cipher text as shown in Figure 1 . This makes it vulnerable to frequency analysis attacks as the frequency of each letter in the cipher text will correspond to the frequency of the original letters in the plaintext. Therefore, it is considered a weak encryption method and is no longer used for serious cryptographic applications. However, it can still be used as a simple way to obscure text such as in puzzles or games.

One of the earliest examples of a monoalphabetic substitution cipher is the Caesar cipher, which was used by Julius Caesar to communicate secretly with his generals. In this cipher, each letter in the plaintext is shifted a certain number of places down the alphabet. For example, if the shift value is three, then the letter A is replaced by D, B is replaced by E, and so on shown in Figure 2 . The recipient of the message would need to know the shift value to decrypt the message.

Another example of a monoalphabetic substitution cipher is the simple substitution cipher in which each plaintext letter is replaced by a corresponding symbol or letter from a fixed substitution pattern. Unlike the Caesar cipher, the substitution pattern for the simple substitution cipher is not based on a fixed shift value. Instead, the substitution pattern is usually chosen randomly or based on a key provided to the recipient.

Despite being simple to implement, monoalphabetic substitution ciphers are not secure by today’s standards as it makes it easier for an attacker to crack the code.

Polyalphabetic substitution: It is made up of multiple monoalphabetic substitutions. In this method, a series of monoalphabetic substitutions are performed on the plaintext, using different substitution alphabets for each letter of the plaintext. This helps to make the ciphertext more difficult to crack as the same plaintext letter can be encrypted in different ways depending on its position in the message.

Vigenère cipher is the most known polyalphabetic substitution, which was invented in the sixteenth century and used by the French military for several centuries [ 14 ]. The Vigenère cipher uses a series of different alphabets, each generated by shifting the previous alphabet by one letter. The cipher is implemented using the Vigenère square (or table), which is made up of twenty-six distinct cipher alphabets as shown in Figure 3 . In the header row, the alphabet is written in its normal order. In each subsequent row, the alphabet is shifted one letter to the right until a 26 × 26 block of letters is formed.

term paper on cryptography

Monoalphabetic substitution cryptography.

term paper on cryptography

Caesar cipher with 1, 2, 3, and 4 shit to the left.

term paper on cryptography

Vigenère square.

Vigenère cipher can be done using the simplest way, which is similar to Caeser cipher or sophisticated way, where keyword is used for the encryption to specify the letter, the keyword is repeated over the length of the plaintext, and each letter of the keyword is used to shift the corresponding letter of the plaintext by a certain number of positions in the alphabet. For example, if you encrypt “security” using the simple way, it will be “TGFYWOAG.” But when using the sophisticated way with “IBRI” as a keyword, the cipher text will be “AFTCZJKG.” To make the cipher more secure, Vigenère suggested using a different keyword for each message rather than reusing the same keyword over and over again. He also suggested using longer keywords to make the cipher even harder to crack. However, if the length of the keyword is known, it can be easily broken using frequency analysis [ 15 ]. Figure 4 shows an example of onetime pad encryption/decryption.

term paper on cryptography

onetime-pad encryption/decryption example.

The onetime pad cipher is not a type of Vigenère cipher. It is a completely different encryption method that is based on using a long, randomly generated key that is at least as long as the plaintext. The key is made up of a series of random symbols, and each symbol is used only once to encrypt one character of the plaintext. Because the key is truly random and used only once, the onetime pad cipher is considered unbreakable, provided that the key is kept secret and destroyed after use by both the sender and the receiver.

The key must be as long as the plaintext for the onetime pad to be unbreakable. Because onetime pad is based on perfect secrecy, which means that the ciphertext provides no information about the plaintext, even if the attacker has unlimited computational power.

Generating truly random keys that are as long as the plaintext is a challenging task, and transmitting them securely to the recipient is also a difficult problem. This is why the onetime pad is mostly used in special cases such as diplomatic and intelligence traffic. Also, onetime pad only guarantees confidentiality and not integrity. This means that an attacker who intercepts the ciphertext can not recover the plaintext, but they can easily modify the ciphertext to change the meaning of the message. Onetime pad requires a unique key for every message, and the keys should be securely destroyed after use to prevent reuse.

The Playfair cipher is a polygraphic substitution cipher invented in 1854 by Sir Charles Wheatstone [ 16 ]. It was the first cipher that allowed for the encryption of pairs of letters instead of single letters. The Playfair cipher uses a 5 × 5 grid of letters, with each letter of the alphabet appearing once. The letters in the grid are usually chosen using a keyword. The keyword is then written into the grid, and the remaining spaces are filled with the letters of the alphabet in order.

5 × 5 table

Skip letter J

Keyword has no repeating letter

fill in the remaining letters in alphabetic order (skip letter J)

Message must be split into pairs

Repeating plaintext letters that are in the same pair are separated with X

If there is an odd letter at the end of the message insert the letter X

Move each letter down one position

Upon reaching end of table, wrap around

Move each letter right one position

Swap the letters with the ones on the end of the rectangle

term paper on cryptography

Playfair cipher steps (A: simple and B: Sophisticated).

An electromechanical machine developed in 2017 [ 17 ] that used a rotating disc with an embedded key to encode a substitution table that changed with every new character typed. This device was the first example of a rotor machine. The following year, a German engineer, invented the Enigma machine [ 18 ], which used multiple rotors instead of one. Initially designed for commercial use, the German military soon recognized the potential of the Enigma machine and began using it to send coded transmissions.

2.2 Transposition cipher

Transposition cipher is an earlier method, where the letters of the message are rearranged according to a certain pattern, but the letters themselves are not changed as shown in Figure 6 . Unlike substitution ciphers, which replace plaintext characters with different symbols or letters, transposition ciphers do not change the characters themselves. Instead, they simply reorder the characters to create a new message. The security of a transposition cipher is based on the difficulty of reconstructing the original message from the reordered characters without knowledge of the used transposition algorithm.

term paper on cryptography

Transposition cipher example.

The Rail Fence cipher is a type of transposition cipher that was first used during the American Civil War. The technique involves writing the plaintext diagonally on a grid, then reading the letters in a zigzag pattern along the rows of the grid to produce the ciphertext. The number of rows in the grid can be adjusted to increase the complexity of the cipher.

For example, suppose we want to encrypt the message “HELLO WORLD” using a Rail Fence cipher with three rows. Write the letters on a grid as shown in Figure 7 .

term paper on cryptography

Rail Fence encryption example.

To decrypt the message, we would write the ciphertext diagonally on a grid, then read the letters in the same zigzag pattern along the rows of the grid to recover the plaintext.

While these ancient methods of cryptography may seem primitive by today’s standards, they laid the foundation for the development of more complex encryption techniques in the future. The principles of substitution and transposition ciphers are still used in modern cryptography, and the need for secure communication continues to drive the evolution of cryptographic algorithms.

3. Symmetric key cryptography

Symmetric key cryptography schemes are categorized as stream ciphers or block ciphers. Stream ciphers work on a single bit at a time and execute some form of feedback structure so that the key is repeatedly changing. A block cipher encrypts one block at a time utilizing the same key on each block. In general, the same plaintext block will continually encrypt to the same ciphertext when using the similar key in a block cipher, whereas the same plaintext will encrypt to different ciphertext.

The history of symmetric key cryptography can be traced back to the days of Julius Caesar, who used a simple substitution cipher to protect his military communications. Over time, various types of symmetric key encryption algorithms were developed, such as the Vigenère cipher, which used a polyalphabetic substitution method, and the Enigma machine, which used a combination of substitution and transposition methods.

3.1 Data encryption standard (DES)

Initial permutation (IP): The 64-bit input plaintext is shuffled (rearranged) according to a fixed permutation table to produce the permuted input. The initial permutation and its inverse are defined by tables that indicate the position of each bit in the input to the output as shown in Figure 8 . The permutation tables are used in the encryption and decryption processes to rearrange the bits of the input according to the specified permutation.

Separation: The left and right halves of each 64-bit intermediate value are treated as separate 32-bit quantities, labeled L (left) and R (right).

Expansion: The input key for each round is 48 bits and the right side (R) is 32 bits. In order to XOR Ki with Ri, we need to expand the length of Ri to 48 bits. The expansion table in Figure 10 is used for this purpose.

The 64-bit key is permuted using a fixed permutation called the permutation choice 1 (PC-1) as shown in Figure 11 . The output of this step is a 56-bit key, where eight of the bits are parity bits and are not used in the encryption process.

The 56-bit key is then split into two 28-bit halves, C0 and D0.

Each of the halves is subjected to a series of circular shifts or rotations. In particular, for rounds 1, 2, 9, and 16, the shifts are one bit, while for all other rounds, the shifts are two bits.

After each shift, the two halves are combined to form a 56-bit value, which is then permuted using a fixed permutation called the permutation choice 2 (PC-2) as shown in Figure 9 . The output of this step is a 48-bit subkey.

This process is repeated for each round of the encryption process, resulting in a total of 16 subkeys.

The subkeys are used in the encryption process as inputs to the round function, which combines them with the plaintext to produce the ciphertext.

Substitution: This 48-bit result passes through a substitution function that produces a 32-bit output. The S-boxes, also known as substitution boxes, are the only nonlinear elements in the DES design. The S-boxes are used to introduce confusion in the ciphertext by replacing each block of 6 bits of the input with a different 4-bit output. There are 8S-boxes in DES as shown in Figure 12 , each taking a 6-bit input and producing a 4-bit output. Each row of an S-box defines a substitution for a specific 4-bit input value, while the column of the S-box defines the output value for that input value based on the remaining 2 bits of the input. This allows for a total of 16 x 4 = 64 possible substitutions in each S-box.

Permutation: The 32-bit outputs from the S-boxes are then concatenated and subjected to a fixed permutation using the P-box permutation.

Final permutation (IP-1): The pre-output is shuffled according to another fixed permutation table, which is the inverse of the initial permutation, to produce the 64-bit cipher text. The figure shows the internal structure of a single round.

term paper on cryptography

The initial permutation and its inverse.

term paper on cryptography

Internal structure of single round.

term paper on cryptography

Expansion permutation table.

term paper on cryptography

Tables used in subkeys generation.

term paper on cryptography

S-boxes used in the substitution step in DES.

The main steps summarized in Figure 13 . The DES key generates 48 bits long 16 round keys from the initial 56 bit key. These keys are used in each round of the encryption process to modify the plaintext. The key involves applying a series of operations, including a permutation, a compression function, and left shifts, to the 56-bit key. The resulting subkeys are used one at a time in each round of the encryption process.

term paper on cryptography

DES Algorithm steps.

However, due to its small key size, DES is now considered insecure [ 19 ] and has been replaced by the advanced encryption s (AES).

The plaintext is encrypted using the first 56-bit key (K1) with the DES algorithm to produce a ciphertext.

The ciphertext from step 1 is decrypted using the second 56-bit key (K2) with the DES algorithm to produce an intermediate value.

The intermediate value from step 2 is encrypted again using the third 56-bit key (K3) with the DES algorithm to produce the final ciphertext.

Thus, 3DES involves encrypting the plaintext with K1, decrypting the result with K2, and encrypting again with K3. The three keys K1, K2, and K3 are usually independent keys generated randomly, although some variants of 3DES use a “keying option” that allows for fewer keys to be used while still maintaining a higher level of security.

While 3DES is slower than DES due to its triple encryption process, it is still considered a relatively fast algorithm and can be implemented in hardware, as well as software. Also, due to its small key size, DES is now considered insecure [ 19 ] and has been replaced by the advanced encryption standard (AES).

3.2 Advanced encryption standard (AES)

The AES (Advanced Encryption Standard) is a symmetric block cipher that operates on fixed-size 128-bit blocks and supports key sizes of 128, 192, and 256 bits. It was standardized by NIST (National Institute of Standards and Technology) in 2001 as a replacement for the aging DES (Data Encryption Standard) cipher.

The AES was selected from a pool of 15 candidate algorithms that were submitted in response to a call for proposals issued by NIST in 1997 [ 21 ]. The selection process involved several rounds of analysis and testing, culminating in the selection of Rijndael [ 22 ], a cipher developed by Belgian cryptographers Joan Daemen and Vincent Rijmen, as the winner.

The AES encryption and decryption algorithms use a series of rounds, where all operations are performed on 8-bit bytes (one Word) ( Figure 14 ). Each round of processing works on the input state array and produces an output state array. The output state array produced by the last round is rearranged into a 128-bit output block. The state array is a 4 × 4 matrix of bytes that represents the input block. Each round, the state array is modified by a series of operations that include byte substitution, permutation, and arithmetic operations over a finite field as shown in the figure below. After the final round, the state array contains the encrypted or decrypted data, which are then copied to an output matrix to produce the final ciphertext or plaintext block.

term paper on cryptography

The structure of AES algorithm.

SubBytes : The substitute bytes stage of AES uses a fixed S-box, which is a 256-byte lookup table, to perform a byte-by-byte substitution of the input block. The S-box is designed so that each input byte is replaced by a unique output byte. The inverse S-box is used in the decryption process, which maps each output byte back to its original input byte. The S-box is a nonlinear component of the AES algorithm, which helps to increase the resistance of the cipher to various attacks. For example, 19 will be mapped to the value crossed between row 1 and column 9, which is equal to D4 in the S-Box as shown in Figure 15 .

ShiftRows : The shiftRows stage is a permutation step that cyclically shifts the bytes in each row of the state array by a certain number of bytes. This operation is applied to each row independently, with no mixing of the bytes between the rows. The number of bytes shifted is determined by the row number: the first row is not shifted at all, the second row is shifted by one byte to the left, the third row is shifted by two bytes to the left, and the fourth row is shifted by three bytes to the left as shown in Figure 16 .

This operation provides diffusion of the input data, which increases the security of the cipher. The inverse operation, used for decryption, is a cyclic shift to the right instead of the left so that the original byte positions are restored.

MixColumns : each column of the state array is treated as a polynomial over the finite field GF(2^8), where each byte is a coefficient of the polynomial. The bytes are then multiplied by a fixed polynomial, and the result is reduced modulo another fixed polynomial. This transformation ensures that each byte in a column is dependent on all four bytes in the same column as demonstrated in Figure 17 .

The multiplication and reduction are done using a pre-computed table of values. The table is constructed in such a way that multiplication is reduced to a simple table lookup and XOR operation.

During decryption, the inverse operation of MixColumns is performed. This involves multiplying each column by a different fixed polynomial and reducing the result modulo another fixed polynomial.

AddRoundkey : Each byte of the current block is XORed with the corresponding byte of the round key. The round key is derived from the main encryption key using a key schedule algorithm, which generates a set of round keys for each round of encryption. This stage serves to add a layer of confusion to the encryption process, making it more difficult to analyze and break the cipher. Figure 18 describe the AddRoundkey process in AES.

term paper on cryptography

S-Box used in AES.

term paper on cryptography

ShiftRows operation and its output (with example).

term paper on cryptography

Mix column function.

term paper on cryptography

Description of the AddRoundkey in AES.

The AES key expansion algorithm takes as input a 128-bit (16-byte) key and generates a sequence of round keys, one for each round of the AES encryption process. The key expansion algorithm uses a key schedule to generate these round keys, which involves performing a series of operations on the input key to generate an expanded key.

The key schedule begins by copying the input key into the first four words of the key schedule. Then, the key expansion algorithm applies a series of operations to the last four words of the current key schedule to generate the next four words. This process is repeated until the key schedule contains the necessary number of round keys for the specified key size. For example, for a 128-bit key, the key schedule will generate 11 round keys, one for each of the 10 rounds of AES encryption plus an initial round key. For a 192-bit key, the key schedule will generate 13 round keys, and for a 256-bit key, the key schedule will generate 15 round keys.

RotWord performs a one-byte circular left shift on a word.

SubWord performs a byte substitution on each byte of its input word, using the S-box.

The result of steps 1 and 2 is XORed with a round constant, Rcon[j].

term paper on cryptography

The values of Rcon[j] in hexadecimal.

The AES cipher is widely used in various applications, including secure communications, data storage, and authentication. Its security has been extensively analyzed, and it is considered to be highly secure against various types of attacks.

3.3 More symmetric algorithms

Blowfish [ 23 ]: A symmetric key block cipher that uses variable-length keys (up to 448 bits) and a block size of 64 bits. Blowfish is widely used in cryptographic applications and is known for its fast encryption and decryption speed.

Twofish [ 24 ]: A symmetric key block cipher that is a successor to Blowfish. It uses a block size of 128 bits and supports key sizes up to 256 bits. Twofish is considered a strong and secure encryption algorithm but is slower than some other algorithms.

Rivest Cipher 4 (RC4) [ 25 ]: A symmetric key stream cipher that is widely used in wireless networks, secure socket layer (SSL), and other applications. RC4 uses a variable-length key (up to 2048 bits) to generate a stream of pseudo-random bytes, which are XORed with the plaintext to produce the ciphertext. However, RC4 has been found to be vulnerable to attacks and is now considered insecure for many applications.

3.4 Mode of operation

Since block ciphers operate on fixed-size blocks of data, they cannot be directly used to encrypt or decrypt messages that are larger than the block size. A mode of operation is a technique used to apply a block cipher to encrypt or decrypt data that is larger than the block size of the cipher.

Modes of operation are used to overcome this limitation by allowing the encryption or decryption of data that is larger than the block size of the cipher. These modes provide methods to break up the input message into blocks, and then apply the block cipher to each block. This process is typically performed using feedback mechanisms that generate input for each subsequent block, based on the output of the previous block.

Electronic codebook (ECB): This is the simplest mode of operation, where each block of plaintext is encrypted independently with the same key as shown in Figure 20 . However, it is not suitable for encrypting large amounts of data or data with a predictable structure. It suffers from the lack of diffusion, which means that identical plaintext blocks will result in identical ciphertext blocks. This makes it vulnerable to attacks as patterns in the plaintext can be easily observed in the ciphertext. For example, an image encrypted with ECB mode will have visible patterns and blocks, making it easy for an attacker to identify certain parts of the image even without decrypting it. Therefore, it is not recommended to use ECB mode for encrypting lengthy messages or sensitive data.

Cipher block chaining (CBC): The cipher block chaining (CBC) mode of operation addresses the issue of repetitive plaintext blocks in ECB mode. This mode XORs each plaintext block with the previous ciphertext block before encryption as shown in Figure 21 . This helps to provide diffusion and makes the encryption process more secure than ECB. Itis worth noting that the sequential nature of CBC encryption can also be an advantage in some cases as it provides a natural form of authentication. If a ciphertext block is corrupted or modified during transmission, the corresponding plaintext block will be affected, and the error will propagate through the rest of the decryption process, making it easier to detect tampering.

However, one-bit change in a plaintext or IV affects all following ciphertext blocks can also be a weakness. This can make it difficult to implement certain types of secure communications protocols such as those that require random access to encrypted data. Additionally, CBC requires a secure and unpredictable initialization vector (IV) for each message, which can be challenging to generate and transmit securely in some scenarios. Finally, as with any mode of operation that relies on a shared secret key, CBC is vulnerable to attacks that exploit weaknesses in the underlying block cipher or key management protocols.

Cipher feedback (CFB): In this mode, the block cipher is used as a feedback mechanism to create a stream cipher. The plaintext is XORed with the output of the block cipher, and the result is encrypted to produce the ciphertext as shown in Figure 22 . This mode allows for variable-length plaintext and provides a self-synchronizing stream cipher. The initial value is called the initialization vector (IV), and it is used to seed the process. The size of the shift registers determines the amount of feedback. For example, if s = 8, the encryption process operates on an 8-bit subset of the plaintext block at a time. If s = n, then the entire plaintext block is used at once.

One advantage of CFB mode is that it allows for error propagation to be contained. If a bit error occurs during transmission, only the block that contains the error is affected. The other blocks remain unchanged. However, one disadvantage of CFB mode is that it is sequential, which means that it cannot be parallelized.

Output feedback (OFB): OFB mode operates on full blocks of plaintext and ciphertext such as other block cipher modes of operation. However, instead of encrypting the plaintext, the block cipher is used to encrypt an IV to generate a keystream. The keystream is then XORed with the plaintext to produce the ciphertext. The key stream is generated independently for each block, so the encryption and decryption can be parallelized as shown in Figure 23 . The main difference between OFB and CFB is that OFB generates a key stream that is independent of the plaintext, while CFB uses the ciphertext as feedback to generate the key stream.

Counter (CTR): This mode encrypts a counter value with a block cipher to produce a keystream, which is then XORed with the plaintext to produce the ciphertext. This mode is similar to OFB, but it allows for parallel encryption and decryption and can be used for random. The counter is incremented for each block of plaintext, and the resulting keystream is used to encrypt that block, see Figure 24 . The advantage of the CTR mode is that it allows for parallel encryption and decryption of blocks since the keystream is generated independently of the plaintext or ciphertext. This can lead to significant speed improvements over other modes, particularly for large messages.

One potential drawback of CTR mode is the need to ensure that the counter values are never repeated as this could compromise the security of the encryption. This can be achieved by using a unique counter value for each block of plaintext, for example by using a nonce (a number used only once) as part of the counter value.

term paper on cryptography

ECB mode encryption.

term paper on cryptography

CBC mode encryption.

term paper on cryptography

CFB mode encryption.

term paper on cryptography

OFB mode encryption.

term paper on cryptography

Counter mode encryption.

4. Asymmetric key cryptography

Asymmetric key cryptography, also known as public-key cryptography, is a cryptographic system that uses a pair of keys to encrypt and decrypt data. The pair of keys consists of a public key, which is known to everyone, and a private key, which is kept secret by its owner. The public key is used for encrypting the data, while the private key is used for decrypting the data. Unlike symmetric key cryptography, where the same key is used for both encryption and decryption, in asymmetric key cryptography, the two keys are mathematically related, but it is computationally infeasible to derive the private key from the public key.

The main advantage of asymmetric key cryptography is that it provides a secure method of communication between two parties without the need for a pre-shared secret key. Asymmetric key cryptography is used in many applications, including digital signatures, key exchange, and encryption of sensitive data.

Some examples of asymmetric key cryptographic algorithms include RSA [ 26 ], Diffie-Hellman [ 27 ], and elliptic curve cryptography (ECC) [ 28 ]. These algorithms are widely used in various applications, including secure communication, digital signatures, and online transactions [ 29 ].

RSA is a widely used public-key cryptosystem. It is been named after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman. Its security is based on the difficulty of factoring large integers, which serves as the foundation for its mathematical operation. RSA has been used for over four decades and is still considered a secure and practical public-key cryptosystem. RSA involves the generation of a public and a private key pair. The public key is distributed to others, while the private key is kept secret. The public key can be used to encrypt messages that only the owner of the private key can decrypt.

Choose two large prime numbers p and q.

Calculate n = p * q and φ(n) = (p−1) * (q−1).

Choose an integer e such that 1 < e < φ(n) and gcd(e, φ(n)) = 1. This value is called the public exponent.

Compute d, the multiplicative inverse of e modulo φ(n). This value is called the private exponent.

Represent the plaintext M as a positive integer less than n.

Compute the ciphertext C as C = Me mod n.

Decryption : Compute the plaintext M as M = Cd mod n.

The security of RSA is based on the difficulty of factoring large composite numbers into their prime factors. Breaking RSA encryption requires factoring the modulus n into its two prime factors p and q, which is a computationally intensive task for large values of n. Therefore, the security of RSA increases as the size of the keys and the modulus increase.

4.2 Diffie-Hellman

Diffie-Hellman (DH) is a key exchange algorithm that allows two parties to establish a shared secret key over an insecure channel. It was developed by Whitfield Diffie and Martin Hellman in 1976 and is based on the discrete logarithm problem in modular arithmetic.

Alice and Bob publicly agree on a large prime number p and a primitive root of p, denoted by g.

Alice randomly chooses a secret integer a and calculates A = g^a mod p. She sends A to Bob.

Bob randomly chooses a secret integer b and calculates B = g^b mod p. He sends B to Alice.

Alice computes the shared secret key as K = B^a mod p.

Bob computes the shared secret key as K = A^b mod p.

Alice and Bob now have a shared secret key that can be used for symmetric encryption.

The security here relies on the fact that computing the discrete logarithm of g mod p is computationally infeasible. This means that an attacker who intercepts A and B cannot calculate a or b, and therefore cannot compute the shared secret key K.

The DH algorithm can be used for secure communication by combining it with a symmetric encryption algorithm. The shared secret key derived using DH is used as the key for the symmetric encryption algorithm, providing confidentiality for communication. Widely used in many cryptographic protocols such as Secure Socket Layer (SSL)/Transport Layer Security (TLS), Secure Shell Protocol (SSH), and Virtual private networks (VPNs) [ 31 , 32 ]. However, it does not provide authentication [ 32 ], and therefore a man-in-the-middle attack is possible if the channel is not authenticated. To address this issue, DH is often used in combination with digital signatures or other authentication mechanisms [ 33 ].

5. Hash functions

Deterministic: The same input should always produce the same output.

Uniform: The output should appear to be random and uniformly distributed, even if the input has patterns or biases.

One-way: It should be computationally infeasible to derive the input data from the hash value.

Collision-resistant: It should be computationally infeasible to find two different input values that produce the same hash output.

Hash functions are commonly used in various security applications such as password storage, digital signatures, and message authentication codes.

6. Digital signatures

Digital signatures are used to ensure the authenticity, integrity, and non-repudiation of a digital document or message. The process of creating a digital signature involves applying a mathematical algorithm to the message or document using the signer’s private key. The resulting value, known as the signature, is unique to both the message and the signer’s private key.

The receiver of the message or document can verify the signature using the signer’s public key, which confirms that the message was indeed sent by the signer and that it has not been altered since it was signed.

Digital signatures can be used in a variety of applications, including software updates, online transactions, and legal documents. They provide a means of verifying the identity of the sender, ensuring the integrity of the message or document, and preventing the sender from denying that they sent the message or document .

7. Future of cryptography

Cryptography has come a long way since its early beginnings, and it continues to play a critical role in securing our digital world today. The advancement of technology has led to more complex and sophisticated encryption methods, which have become essential for protecting sensitive information such as financial transactions, personal data, and confidential communication. With the rise of the internet and mobile technology, cryptography has become more important than ever. It is used in everything from e-commerce to social media to secure online communication [ 34 ]. As technology continues to evolve, so will the field of cryptography, and new techniques and algorithms will be developed to stay ahead of emerging threats. The future of cryptography holds great promise as researchers work to develop quantum-resistant encryption and new methods for securing blockchain technology. As we rely more and more on digital communication and storage, the role of cryptography in securing our data will only become more critical.

7.1 Quantum cryptography

Quantum computers have the potential to break many of the current cryptographic schemes that rely on the difficulty of certain mathematical problems [ 35 ]. Quantum cryptography aims to develop new cryptographic schemes that are resistant to attacks by quantum computers [ 36 ]. It makes use of the principles of quantum mechanics to provide a high level of security. Also, uses quantum mechanical properties to protect information in transit.

In traditional cryptography, the security of the system relies on the complexity of mathematical algorithms, while in quantum cryptography, the security relies on the laws of physics. Specifically, quantum cryptography uses the principle of quantum entanglement, which involves the correlation of quantum states between two particles.

The most widely known application of quantum cryptography is quantum key distribution (QKD) [ 37 ]. QKD is a protocol that enables two parties to establish a shared secret key that is completely secure against eavesdropping, even by an attacker with unlimited computing power. QKD works by transmitting a series of quantum states, or qubits, between two parties, typically named Alice and Bob. The qubits are generated using a laser and a polarizer. Alice sends a random sequence of polarizations to Bob, who measures the polarizations using his own set of polarizers. By comparing the polarizations, Alice and Bob can detect the presence of an eavesdropper.

There are many challenges to overcome before quantum cryptography can be widely adopted. One of the main challenges is the difficulty of building practical quantum cryptography systems, which require precise control of the quantum states involved. Additionally, there is a need for more research in quantum computing, as well as a need for new protocols that can be used to secure communications in different contexts.

7.2 Homomorphic encryption

Homomorphic encryption is another type of encryption that allows computation to be performed on ciphertext [ 38 ], which means that data can be encrypted and manipulated without the need to decrypt it first. In other words, it enables computations to be performed on data without revealing the data itself. This is a significant breakthrough in the field of cryptography as it allows for secure computation and data analysis without compromising privacy [ 39 ]. Homomorphic encryption has numerous applications in various fields such as finance, healthcare, and cloud computing [ 40 ]. For instance, it can be used to perform secure data analysis on sensitive data [ 41 ], such as medical records, without the need to reveal the data to unauthorized parties. It can also be used in cloud computing to protect data privacy while still allowing for secure computation in the cloud.

7.3 Block chain cryptography

Blockchain-based cryptography is a critical component of blockchain technology, which is widely used in various fields such as finance, healthcare, and supply chain management [ 42 ]. it is a distributed ledger that records transactions in a secure and transparent manner. Cryptography is used in blockchain to ensure the confidentiality, integrity, and authenticity of data stored in the blockchain network.

One of the essential cryptographic techniques used in blockchain is the digital signature. A digital signature is a mathematical scheme that validates the authenticity and integrity of a message or data. Digital signatures are used to verify transactions in the blockchain network, ensuring that the sender is the actual owner of the assets and preventing any tampering of the data [ 42 ].

Another critical cryptographic technique used in the blockchain is hash functions. Hash functions are used to create a unique digital fingerprint of data stored in the blockchain network. This unique digital fingerprint, also known as a hash value, ensures that the data is tamper-proof and cannot be altered without being detected.

Blockchain technology also employs public-key cryptography, which is a cryptographic technique that uses a pair of keys, one public and one private. Public keys are used to encrypt data, while private keys are used to decrypt data. This technique ensures the confidentiality and security of data stored in the blockchain network.

Blockchain-based cryptography plays a vital role in ensuring the security and transparency of data stored in the blockchain network. As blockchain technology continues to evolve, we can expect to see new cryptographic techniques and algorithms that will further enhance the security and efficiency of blockchain-based applications.

7.4 Multiparty computation

Multiparty computation (MPC) is a cryptographic technique that enables a group of parties to jointly compute a function on their private inputs, without revealing those inputs to each other or to any third party. This technique allows parties to collaborate and compute a result without sharing their individual data, which can be particularly useful in scenarios where data privacy is critical, such as in financial transactions or medical research [ 43 ].

Each party inputs its private data into the system, which then generates a shared output based on the combined inputs of all parties. The protocol ensures that no individual party can learn anything about the private inputs of any other party, and the final output is only known to those parties who have contributed inputs.

MPC has many practical applications, including secure auctions, electronic voting systems, and privacy-preserving data analysis. However, it can be computationally expensive, especially when the number of parties and the complexity of the function being computed increase. Despite these challenges, MPC is a powerful tool for achieving secure collaboration and computation among multiple parties [ 44 ].

7.5 Lightweight cryptography

Lightweight cryptography refers to a subset of cryptographic algorithms that are specifically designed to operate efficiently on low-resource devices such as smart cards, RFID tags, and wireless sensor nodes. These devices often have limited processing power, memory, and energy resources, making it challenging to implement traditional cryptographic algorithms on them. Lightweight cryptography aims to address these challenges by developing cryptographic algorithms that have low computational and memory requirements, while still providing a reasonable level of security.

The development of lightweight cryptography has become increasingly important with the proliferation of the Internet of Things (IoT) and other low-power, low-cost devices. These devices are becoming more prevalent in our daily lives, and many of them require secure communication and authentication. Lightweight cryptography can provide a practical and efficient solution for securing these devices, without sacrificing security. Some examples of lightweight cryptography algorithms include SIMON and SPECK block ciphers, which were designed by the National Security Agency (NSA) for use in constrained environments. Another example is the lightweight version of the advanced encryption standard (AES), known as AES-Lite. These algorithms have been adopted by various standardization bodies and are widely used in industry for securing low-resource devices.

8. Conclusions

Cryptography is a critical aspect of modern information security. It has evolved significantly over time, from basic substitution ciphers to sophisticated algorithms that provide secure communication and transactions. Today, we have various types of cryptographic schemes, including symmetric and asymmetric encryption, hash functions, digital signatures, homomorphic encryption, and multiparty computation. The development of lightweight cryptography has also enabled secure communication and transactions on low-power devices such as IoT devices. As technology continues to advance, the field of cryptography will play an increasingly vital role in ensuring secure communication and transactions in an interconnected world. The future of cryptography is exciting and promising, and we can expect to see more innovations that will enhance the security and privacy of our digital world.

  • 1. Bruce S. Applied cryptography: protocols, algorithms, and source code in C. 2nd ed. Hoboken, New Jersey: John Wiley & Sons; 1996
  • 2. Diffie W, Hellman ME. Multiuser cryptographic techniques. In: Proceedings of the June 7-10, 1976, national computer conference and exposition. ACM Digital Library; 1976. pp. 109-112
  • 3. Blakley GR, Borosh I. Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages. Computers & Mathematics with Applications. 1979; 5 :169-178
  • 4. Rescorla E. Diffie-Hellman Key Agreement Method. 2070-1721, 1999
  • 5. Sobti R, Geetha G. Cryptographic hash functions: A review. International Journal of Computer Science Issues (IJCSI). 2012; 9 :461
  • 6. Rogaway P, Shrimpton T. Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: FSE, 2004, Lecture Notes in Computer Science. Vol. 3017. Springer Verlag; 2004. pp. 371-388
  • 7. Menezes AJ, van Oorschot PC, Vanstone SA. Handbook of applied cryptography (202101 ed.). 2021; 1 :1-810
  • 8. Wong D. Real-world cryptography. Shelter Island, NY: Manning Publications; 2021
  • 9. Chaubey NK, Prajapati BB. Quantum cryptography and the future of cyber security. Hershey, PA: IGI Global; 2020. DOI: 10.4018/978-1-7998-2253-0
  • 10. Poongothai T, Jayarajan K, Rajeshkumar G, Patra P. Blockchain technology in healthcare applications. Journal of Critical Reviews. 2020; 7 :8701-8707
  • 11. Bertaccini M. Cryptography algorithms: A guide to algorithms in blockchain, quantum cryptography, zero - knowledge protocols, and omomorphic encryption. Birmingham, UK: Packt Publishing, Limited; 2022. DOI: 10.1007/978-183882-844-4
  • 12. Singh S. The Code Book. Vol. 7. New York: Doubleday; 1999
  • 13. Davies D. A brief history of cryptography. Information Security Technical Report. 1997; 2 :14-17
  • 14. Mendelsohn CJ. Blaise de Vigenère and the “Chiffre Carré”. In: Proceedings of the American Philosophical Society. 1940; 83 (4):103-129
  • 15. Schrödel T. Breaking short Vigenère ciphers. Cryptologia. 2008; 32 :334-347
  • 16. Wade NJ. Charles Wheatstone (1802–1875). ed: SAGE Publications ed. Vol. 31. London, England: Sage UK; 2002. pp. 265-272
  • 17. Kruh L. Cipher equipment. Cryptologia. 1977; 1 :143-149
  • 18. Smart NP, Smart NP. The enigma machine. Cryptography Made Simple. 2016; 64 (2):133-161
  • 19. Sidhu A. Analyzing modern cryptography techniques and reviewing their timeline. Security and Communication Networks. 2023; 10 :1-18
  • 20. Stamp M. Information security: principles and practice. Hoboken, NJ: John Wiley & Sons; 2011
  • 21. Smid ME. Development of the advanced encryption standard. Journal of Research of the National Institute of Standards and Technology. 2021; 126 :1-18
  • 22. Daemen J, Rijmen V. AES proposal: Rijndael. National Institute of Standards and Technology; 1999
  • 23. Schneier B. Description of a new variable-length key, 64 bit block cipher (Blowfish). In: Fast Software Encryption: Cambridge Security Workshop Cambridge, UK, December 9 11, 1993 Proceedings. Berlin, Heidelberg: Springer; 2005. pp. 191-204
  • 24. Schneier B. The twofish encryption algorithm. Dr Dobb's Journal: Software Tools for the Professional Programmer. 1998; 23 :30-34
  • 25. Rivest RL. The RC4 encryption algorithm, 1992. Vol. 25. RSA Data Security Inc.; 2016. pp. 1-23.
  • 26. Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 1978; 21 :120-126
  • 27. Hellman M. New directions in cryptography. IEEE Transactions on Information Theory. 1976; 22 :644-654
  • 28. Lenstra HW. Factoring integers with elliptic curves. Annals of Mathematics. 1987; 126 (3):649-673
  • 29. Pachghare V. Cryptography and information security. Noida, Uttar Pradesh, India: PHI Learning Pvt. Ltd.; 2019
  • 30. Katz J, Lindell Y. Introduction to modern cryptography. Boca Raton, FL: CRC Press; 2020
  • 31. Li Y. Design and analysis of cryptographic protocols [Dissertation], 2015. Bochum: Ruhr-Universität Bochum; 2016
  • 32. Carts DA. A review of the Diffie-Hellman algorithm and its use in secure internet protocols. SANS Institute; 2001; 751 :1-7
  • 33. Medina R III. Systems and Methods for Digital Signature Detection. ed: Google Patents ed. 2015
  • 34. Tarawneh M, AlZyoud F, Sharrab Y, Kanaker H. Secure E-health framework in cloud-based environment. In: 2022 International Arab Conference on Information Technology (ACIT). IEEE; 2022. pp. 1-5
  • 35. Subramani S, Svn SK. Review of security methods based on classical cryptography and quantum cryptography. Cybernetics and Systems. 2023; 54 (1):1-19
  • 36. Mavroeidis V, Vishi K, Zych MD, Jøsang A. The impact of quantum computing on present cryptography. arXiv Preprint arXiv:1804.00200. 2018
  • 37. Renner R. Security of quantum key distribution. International Journal of Quantum Information. 2008; 6 :1-127
  • 38. Lauter KE, Dai W, Laine K. Protecting privacy through homomorphic encryption. Cham, Switzerland: Springer; 2022
  • 39. Doan TVT, Messai M-L, Gavin G, Darmont J. A survey on implementations of homomorphic encryption schemes. The Journal of Supercomputing. 2023; 79 :15098-15139
  • 40. Chatterjee A, Aung KMM. Fully homomorphic encryption in real world applications. Singapore: Springer; 2019
  • 41. Viand A, Knabenhans C, Hithnawi A. Verifiable fully homomorphic encryption. arXiv Preprint arXiv:2301.07041. 2023
  • 42. Bolfing A. Cryptographic Primitives in Blockchain Technology: A Mathematical Introduction. New York, USA: Oxford University Press; 2020
  • 43. Goldreich O. Secure multi-party computation. Manuscript. Preliminary version. 1998; 78 :1-78
  • 44. Darby ML, Nikolaou M. MPC: Current practice and challenges. Control Engineering Practice. 2012; 20 :328-342

© 2023 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution 3.0 License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Continue reading from the same book

Edited by Sudhakar Radhakrishnan and Carlos M. Travieso-Gonzalez

Published: 19 June 2024

By Asma’a Al-Hakimi, Muhammad Ibrahim Ravi Bin Gobi a...

10 downloads

By Gideon Samid

37 downloads

By Carlos M. Travieso-González

12 downloads

chrome icon

Showing papers in "Cryptography in 2022"

Designing a practical code-based signature scheme from zero-knowledge proofs with trusted setup.

20  citations

A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions

12  citations

Benchmark Analysis of YOLO Performance on Edge Intelligence Devices

11  citations

Light Weight Authentication Scheme for Smart Home IoT Devices

Variations of qkd protocols based on conventional system measurements: a literature review.

10  citations

A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments

Chacha20-poly1305 authenticated encryption with additional data for transport layer security 1.3.

9  citations

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity

8  citations

On the IND-CCA1 Security of FHE Schemes

7  citations

Adaptable Cryptographic Primitives in Blockchains via Smart Contracts

5  citations

Connected Blockchain Federations for Sharing Electronic Health Records

Combining markov and semi-markov modelling for assessing availability and cybersecurity of cloud and iot systems, bfv-based homomorphic encryption for privacy-preserving cnn models, hardware limitations of lightweight cryptographic designs for iot in healthcare, wpaxfuzz: sniffing out vulnerabilities in wi-fi implementations, quantum secret aggregation utilizing a network of agents, attribute-based encryption in securing big data from post-quantum perspective: a survey, low-cost area-efficient fpga-based multi-functional ecdsa/eddsa, efficient ro-puf for generation of identifiers and keys in resource-constrained embedded systems, a new chaotic-based rgb image encryption technique using a nonlinear rotational 16 × 16 dna playfair matrix, certificate management scheme for vanets using blockchain structure, certificateless searchable encryption scheme in multi-user environment, multi-wavelength quantum key distribution emulation with physical unclonable function, network-compatible unconditionally secured classical key distribution via quantum superposition-induced deterministic randomness, a cca-pke secure-cryptosystem resilient to randomness reset and secret-key leakage, quantum identity-based encryption from the learning with errors problem, trusted and secure blockchain-based durable medium electronic service, multiverse of hawkness: a universally-composable mpc-based hawk variant, continuous nonintrusive mobile device soft keyboard biometric authentication, cryptographic rational secret sharing schemes over general networks.

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

cryptography-logo

Journal Menu

  • Cryptography Home
  • Aims & Scope
  • Editorial Board
  • Reviewer Board
  • Instructions for Authors
  • Special Issues
  • Sections & Collections
  • Article Processing Charge
  • Indexing & Archiving
  • Most Cited & Viewed
  • Journal Statistics
  • Journal History
  • Editorial Office

Journal Browser

  • arrow_forward_ios Forthcoming issue arrow_forward_ios Current issue
  • Vol. 8 (2024)
  • Vol. 7 (2023)
  • Vol. 6 (2022)
  • Vol. 5 (2021)
  • Vol. 4 (2020)
  • Vol. 3 (2019)
  • Vol. 2 (2018)
  • Vol. 1 (2017)

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

Cybersecurity, Cryptography, and Machine Learning

  • Special Issue Editors

Special Issue Information

  • Published Papers

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: closed (30 October 2021) | Viewed by 16179

Share This Special Issue

Special issue editor.

term paper on cryptography

Dear Colleagues,

Cybersecurity for the past decades has been in the front line of global attention as an increasingly critical area of concern. The ever-expanding complexity of modern computing systems has resulted in the growth of security vulnerabilities, making such systems appealing targets for sophisticated cyber-attacks. The rapid development of computing devices in various domains such as high-performance computing, cloud/edge/fog computing, embedded systems, mobile platforms, and Internet-of-Things (IoT) combined with emerging 5G cellular networks further exacerbates the impact of cybersecurity threats, calling for efficient security countermeasures to protect legitimate users from these attacks. Cryptography is one of the most important tools that has been widely deployed by researchers and practitioners in academia and industry to build secure information technology infrastructures ensuring the confidentiality of data and protecting users’ information from unauthorized access. Furthermore, advancements in the area of artificial intelligence and machine learning, driven by a significant increase in the size of data getting generated and transferred over networks, have resulted in successful applications of machine learning algorithms to automatically identify and analyze security threats protecting organizations against evolving cyber-attacks. As a result, the goal of this Special Issue is to highlight the latest technologies and solutions that focus on theory, analysis, experiments, or application of cybersecurity, cryptography, and machine learning in modern computing systems. Papers dealing with systematization of knowledge and survey papers are also welcome. Specific topics of interest include, but are not limited to:

  • Cryptographic primitives and protocols
  • Applied cryptography for cybersecurity
  • Application of machine learning for cybersecurity and cryptography
  • Artificial intelligence security (e.g., adversarial machine learning)
  • Network security
  • Intrusion detection systems
  • Malware detection and identification
  • Advanced persistent threats analysis
  • Denial-of-Service (DoS) attacks and defenses
  • Side-channel attacks analysis, detection, and mitigation techniques
  • Hardware security and trust
  • Formal methods for secure hardware and software
  • Detection and prevention of hardware trojans
  • Hardware and software reverse engineering
  • Fault attacks and countermeasures
  • FPGA design security
  • Mobile security
  • Internet-of-Things (IoT) security
  • Vulnerability analysis techniques
  • Cyber physical systems security and resilience
  • Security and privacy for cloud, edge, and fog computing
  • Cybersecurity metrics and assessment

Dr. Hossein Sayadi Guest Editor

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website . Once you are registered, click here to go to the submission form . Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

  • Cybersecurity
  • Cryptography
  • Machine Learning
  • Threats and Countermeasures
  • Intrusion Detection
  • Side-Channel Attacks
  • Adversarial Learning
  • Physical Attacks
  • IoT Security
  • Fault attacks

Published Papers (3 papers)

Jump to: Review

term paper on cryptography

Jump to: Research

term paper on cryptography

Further Information

Mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

1000 Projects Logo

1000 Projects

Free BTech BE Projects | MTech ME Projects | MCA Projects | MBA Projects

Term Paper on Cryptography

Various technologies are trying hard to maintain security of information using cryptography. In the present paper we speak about cryptographic techniques with three algorithms named private key algorithm, public key algorithm, and using hash functions. This paper also includes the drawbacks of classical cryptography and also needs to update new trends like quantum and elliptic curve cryptography.

These technologies can meet the demands of various environments and many tasks have been automated to simplify the functions of administrators. By this document we can conclude that we can maintain secrecy in message from attacks of message hackers.

The internet is a computer network, has addresses administrated by IANA (Internet address and Naming Authority). Internet which is providing services of communication to its millions of customers, security has become an issue. The applications can range from simple to private communications and also protecting passwords.

It is the art of protecting data. In data and telecommunications, cryptography is necessary when communication is on untrusted medium, which can be any network, especially the Internet.

The three types of cryptographic schemes includes Secret key cryptography which works on a single key, for both encryption and decryption , Public-key which uses one key for encryption and other for decryption and Hash functions makes use of mathematical transformation for encrypting information. In terms of Cryptography the initial unencrypted data is called as plaintext and encrypted data is named as cipher text. 

Depending on security services we use different types of algorithms i.e. If the message is to be sent quickly we use private key algorithm and use public key algorithm if the message to be sent secretly.

There are different schemas for cryptographic algorithm as each application is optimal for specific application where hash functions are suited to provide data integrity and secret key is suited for encryption of messages and key exchange for non-repudiation. 

Download   Term Paper on Cryptography.

Related Projects

  • CSE Term Paper on Red Tacton
  • Cryptography Seminar Report
  • Network Security and Cryptography Seminar Paper
  • Paper Presentation For EEE Topics
  • Seminar paper on Emotional intelligence
  • Android seminar topic
  • Hacking seminar topic
  • CSE Seminar Topics List Biometrics
  • Paper Presentation Videos
  • Kerberos seminar topic

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I'm interested in using this for my final project, please send code related to this project.

' src=

how to download

' src=

Tell me the software requirements and wt are the application required to create this app if possible help me or…

How to do this project what are the software requirements plz can u tell this will help for my final…

' src=

a good project

  • Civil Geotechnical Engineering Projects List
  • Biotechnology Projects for B.Sc, M.Sc & M.Tech
  • Civil Engineering Construction Management Projects
  • Civil Structural Engineering Projects
  • Impact of IT on Sales Industry with special reference to Retail, FMCG & E-Commerce Industries
  • E-Learning System Web Portal Java Project
  • Hackathon the Code Festival Java Project
  • Simple Hospital Management System Project in C
  • E-Commerce Website for Online Nursery Store Plants & Accessories
  • Bookstore Management System PHP MySQL Project

.Net Framework AI Ajax Anaconda Android ANOVA Arduino UNO Asp.Net Bootstrap C#.Net C++ CSS DBMS Django Framework Eclipse Firebase Flask GitHub GPS Module GUI HTML IBM Cloud IBM Watson IOS IoT Java Javascript JDBC jQuery Js JSON JSP ML Mobile apps MongoDB Ms Access MVC MySQL Netbeans IDE Node-Red NODE JS OpenCV Oracle PHP PHPMyAdmin Python Raspberry pi React js Salesforce Servlets Spring SQL SQLite SQL Server Tomcat UI Visual Studio Code WAMP xampp XML

Advertisement

Supported by

What the Arrival of A.I. Phones and Computers Means for Our Data

Apple, Microsoft and Google need more access to our data as they promote new phones and personal computers that are powered by artificial intelligence. Should we trust them?

  • Share full article

term paper on cryptography

By Brian X. Chen

Brian X. Chen is the author of Tech Fix , a weekly column about the societal implications of the tech we use.

Apple, Microsoft and Google are heralding a new era of what they describe as artificially intelligent smartphones and computers. The devices, they say, will automate tasks like editing photos and wishing a friend a happy birthday.

But to make that work, these companies need something from you: more data.

In this new paradigm, your Windows computer will take a screenshot of everything you do every few seconds. An iPhone will stitch together information across many apps you use. And an Android phone can listen to a call in real time to alert you to a scam.

Is this information you are willing to share?

This change has significant implications for our privacy. To provide the new bespoke services, the companies and their devices need more persistent, intimate access to our data than before. In the past, the way we used apps and pulled up files and photos on phones and computers was relatively siloed. A.I. needs an overview to connect the dots between what we do across apps, websites and communications, security experts say.

“Do I feel safe giving this information to this company?” Cliff Steinhauer, a director at the National Cybersecurity Alliance, a nonprofit focusing on cybersecurity, said about the companies’ A.I. strategies.

All of this is happening because OpenAI’s ChatGPT upended the tech industry nearly two years ago. Apple, Google, Microsoft and others have since overhauled their product strategies, investing billions in new services under the umbrella term of A.I. They are convinced this new type of computing interface — one that is constantly studying what you are doing to offer assistance — will become indispensable.

The biggest potential security risk with this change stems from a subtle shift happening in the way our new devices work, experts say. Because A.I. can automate complex actions — like scrubbing unwanted objects from a photo — it sometimes requires more computational power than our phones can handle. That means more of our personal data may have to leave our phones to be dealt with elsewhere.

We are having trouble retrieving the article content.

Please enable JavaScript in your browser settings.

Thank you for your patience while we verify access. If you are in Reader mode please exit and  log into  your Times account, or  subscribe  for all of The Times.

Thank you for your patience while we verify access.

Already a subscriber?  Log in .

Want all of The Times?  Subscribe .

COMMENTS

  1. (PDF) A Review Paper on Cryptography

    Cryptography has the importa nt purpose of providing reliabl e, strong, and robust network and data security. In this paper, we. demonstrated a review of some of the research that has been ...

  2. A Review Paper on Cryptography

    A Review Paper on Cryptography Abstract: With the internet having reached a level that merges with our lives, growing explosively during the last several decades, data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification ...

  3. (PDF) Cryptography

    [email protected]. Ab stract—The wide use of cryptography is a necessary. consequence of the information revolution. With the existence of. electronic transmissions on computer ...

  4. PDF A Review Paper on Cryptography

    Cryptography can be defined as techniques that cipher data, depending on specific algorithms that make the data unreadable to the human eye unless decrypted by algorithms that are predefined by the sender. Keywords — Cryptography, Security, Decryption, Data Security. Algorithm, Cipher, I. INTRODUCTION Cryptography is a technique to achieve ...

  5. Cryptography

    Cryptography is an international, scientific, peer-reviewed, open access journal on cryptography published quarterly online by MDPI.. Open Access — free for readers, with article processing charges (APC) paid by authors or their institutions.; High Visibility: indexed within Scopus, ESCI (Web of Science), dblp, and other databases. Journal Rank: JCR - Q2 (Computer Science, Theory and Methods ...

  6. A review on various cryptographic techniques & algorithms

    Cryptography is a tool to execute messages confidentiality. In Greek, the word "composing mystery" has a special meaning. The working cycle that changes through the actual message is called in plaintext as cypher text. The conversation loop, called scrambling, restores plaintext from the chip text [1] .

  7. Cryptography Primer: Introduction to Cryptographic Principles and

    An introduction to cryptographic principles is presented, along with well-known and broadly applied cryptographic algo-rithms and protocols. Excellent cryptographic guides for further details on the subject can be found in [1-4]. Below, we defi ne some basic cryptographic principles. A.1.1.

  8. Introduction to Cryptography

    Abstract. In modern digitalized society, cryptography is the pillar of security. Cryptography is used to protect data while in transit over unsecure channels and data on storage devices (i.e. USB devices, disks, etc.). This chapter succinctly introduces the terminology, notions, algorithms, and attacks relating to cryptography.

  9. Special Issue on Cryptography and Information Security

    Additionally, we examine post-quantum cryptography, a vital area of research in the face of the impending arrival of quantum computers. Another vital aspect of our Special Issue is secure communication protocols. As cyber threats continue to evolve, we explore advances in network security, transport layer security, and end-to-end encryption.

  10. Advanced Cryptography Term Papers CSCI-762, Spring 2020

    Advanced Cryptography Term Papers CSCI-762, Spring 2020 Choosing a Topic. In general, I prefer more algorithm and cryptography oriented focus, but security topics (with significant cryptography component) are also fine. ... make a clickable title of the proposed term paper write and post a short abstract of your paper in simple html send me ...

  11. Perspective Chapter: Cryptography

    Cryptography is considered as a branch of both mathematics and computer science, and it is related closely to information security. This chapter explores the earliest known cryptographic methods, including the scytale, Caesar cipher, substitution ciphers, and transposition ciphers. Also, explains the evolution of these methods over time. The development of symmetric and asymmetric key ...

  12. A research Paper on Cryptography Encryption and Compression Techniques

    References (1) ... Encryption as an IT strategy for achieving confidentiality and availability of data, is among the viable solutions used to protect the data that lives in and between the devices ...

  13. Top 65 Cryptography papers published in 2022

    Explore 65 research articles published in the Journal Cryptography (Multidisciplinary Digital Publishing Institute) in the year 2022. The journal publishes majorly in the area (s): Computer science & Encryption. Over the lifetime, 101 publication (s) have been published in the journal receiving 171 citation (s).

  14. Cybersecurity, Cryptography, and Machine Learning

    As a result, the goal of this Special Issue is to highlight the latest technologies and solutions that focus on theory, analysis, experiments, or application of cybersecurity, cryptography, and machine learning in modern computing systems. Papers dealing with systematization of knowledge and survey papers are also welcome.

  15. PDF A RESEARCH PAPER ON CRYPTOGRAPHY

    Data Encryption A data encryption is a random string of bits created explicitly for scrambling and unscrambling data. Data encryption is designed with algorithms intended to ensure that every key is unpredictable and unique. Cryptography uses two types of keys: symmetric and asymmetric. Symmetric keys have been around the longest;

  16. PDF Cryptography: From the Ancient History to Now, It'S Applications and A

    Cryptography or cryptology is the practice and study of techniques for secure communication in the presence of "adversaries" (the third parties). More generally, cryptography is about burning the message in such a way that prevents third parties or the public from reading private messages [11]. Cryptography is a method of protecting

  17. PDF Introduction to Cryptography

    The Data Encryption Standard • In 1974, NBS (now NIST) adopted the Data Encryption Standard (DES)for sensitive but unclassified data • Some sources claim the need was realized after the Soviets intercepted calls by US private sector grain deal negotiators • DES is a block cipherand encrypts 64 bits (8 bytes) at a time • The key length is 56 bits—72,057,594,037,927,936 possible

  18. (PDF) A Review on Cryptography in Cloud Computing

    Cryptography and steganography techniques are used for cloud storage to address data security challenges. This paper presents a novel method for securely encrypting image data for transmission and ...

  19. An Exploration to the Quantum Cryptography Technology

    Here, we are abiding to discuss the term "Quantum Cryptography." The aim of this paper is to explore the knowledge related to the Quantum Cryptography, Quantum Key Distribution; and their elements, implementation, and the latest research. Moreover, exploration of the loopholes and the security of Internet of Things (IoT) infrastructure and ...

  20. Cryptography Term Paper Topics

    Cryptography Term Paper Topics - Free download as PDF File (.pdf), Text File (.txt) or read online for free. This document discusses the challenges students face when writing a term paper on cryptography. It notes that cryptography is a complex field that requires an understanding of advanced mathematical concepts as well as thorough research.

  21. Term Paper on Cryptography

    In the present paper we speak about cryptographic techniques with three algorithms named private key algorithm, public key algorithm, and using hash functions. This paper also includes the drawbacks of classical cryptography and also needs to update new trends like quantum and elliptic curve cryptography. These technologies can meet the demands ...

  22. Term Paper On Cryptography

    Term Paper on Cryptography - Free download as PDF File (.pdf), Text File (.txt) or read online for free. term paper on cryptography

  23. Upcoming Book on AI and Democracy

    Blog Essays Whole site. Subscribe. Home Blog. Upcoming Book on AI and Democracy. If you've been reading my blog, you've noticed that I have written a lot about AI and democracy, mostly with my co-author Nathan Sanders. I am pleased to announce that we're writing a book on the topic. ... Applied Cryptography; artificial intelligence; More ...

  24. (PDF) Cloud Cryptography -A Security Aspect

    This. paper examines a variety of c ryptographic methods used b y. major cloud providers. It proposes an alternative algorithm. for encrypting data in transit from the user to the cloud in. order ...

  25. What the Arrival of A.I. Phones and Computers Means for Our Data

    Apple, Microsoft and Google are heralding a new era of what they describe as artificially intelligent smartphones and computers. The devices, they say, will automate tasks like editing photos and ...