Chapter

Introduction to Cryptography

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The word cryptography is derived from the Greek words kryptos, meaning “hidden,” and grafein, meaning “to write.” Throughout history, cryptography has been used to hide messages inside tradional means of communication that might otherwise be intercepted. Doing so is accomplished by concealing the contents of the message from all except who has the key to unlock it. In modern times, cryptographic techniques are used to protect e-mail messages, information transmitted over the internet, credit card information, and data on corporate networks.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... This was accomplished by camouflaging the content of the message from all except the one who has the key, he/she is the only one who will be able to decrypt the message.But nowadays, cryptography techniques is used in protecting e-mail messages, information that is transmitted over the internet, credit card information, and data on corporate networks. Computers utilize a wide range of cryptographic techniques, they are provided for two reasons: to keep the data safe while it's on a computer or while it's being moved between two computers or across networks [11]. ...
... AES always uses a key size of 128, 192, or 256 bits as well as a block length of 128 bits. While DES is not approved any more, due to the fact that anyone now can attack it easily by using any modern computer [11]. ...
Thesis
Full-text available
Since image transmission via computer networks, especially the Internet, is developing at a rapid speed, the security of digital images has become a key concern. In this thesis, I am proposing a new medical image encryption scheme. The first stage incorporates the use of the Fibonacci sequence, the second stage incorporates the use of an S-box, and the third stage makes use of the Tan Bessel logistic function. The proposed scheme's performance is evaluated using various metrics. According to the results of the evaluation, the proposed scheme proved that it is resistant to statistical attacks and robust against differential attacks.
... Cryptography has been used to hide communications inside traditional modes of communication that could otherwise be intercepted throughout history. This is accomplished by keeping the contents of the message hidden from everyone except those with the key to unlock it [5]. ...
Article
Full-text available
This paper aims to discuss the new possibilities of cryptography and information warfare enabled by the emergence of quantum computing as a new formative factor. In this review paper, the author discusses how the novel technology of quantum computing can revolutionize the conventional cryptographic approaches that constitute the backbone of the security of information systems used in military and strategic facilities. We discuss basic quantum algorithms, including Shor's and Grover's algorithms, and demonstrate how those can threaten current cryptographic systems and challenge the security of world infrastructures. Furthermore, the paper examines the establishment and application of quantum-resistant cryptography, a prominent safeguard against a rising quantum menace. In this study, we synthesize the state-of-art development in quantum computing systems and evaluate their impacts on informational warfare intending and defending, including new attack power and protection patterns. It also expands the discussion to strategic ethical and policy implications of quantum technologies in warfare. The objective of this paper is thus to give a clear vision of how Quantum Computing altered the dynamics of information warfare and gain insight into where the future of cryptographic security is heading in an era dominated by quantum technologies.
Article
Nowadays, almost all software products are sold online. But there is a danger of unauthorized users using the product. For this reason, every company employs a product activation system where only authorized users that have a unique key called the product key can use the application. But attackers always find a way to get past the authorization. For example, they use a key generator that generates a random key that matches the format of the product key and can be used to activate the product. Therefore, to avoid this, we need improved product activation programs that can safeguard the product from unauthorized users. This paper proposes an improved key verification system to make sure that the product can be used on one system only. Every system has a unique MAC address, and that's what we use as the foundation for our method. The main contribution of this work is the effective use of a system's MAC address, which in turn boosts the security of the project. The necessary procedure consists of retrieving a MAC address from the user's system. Now, a serial key is derived by performing specific operations on the MAC address, which is then converted into a more straightforward, user-friendly product key while encryption and decryption take place during the transmission of keys between client and server. Looking ahead, this work can lead to better and consistent use of MAC addresses in key generation techniques, which is something that hasn't been explored enough.
ResearchGate has not been able to resolve any references for this publication.