Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Modern Cryptographic Schemes: Applications and Comparative Study


Affiliations
1 St. Mary’s University, San Antonio, TX, United States
     

   Subscribe/Renew Journal


Cryptography and encryption have been used for secure communication. In the modern world, cryptography is a very important tool for protecting information in computer systems. With the invention of the World Wide Web or Internet, computer systems are highly interconnected and accessible from any part of the world. As more systems get interconnected, more threat actors try to gain access to critical information stored on the network. It is the responsibility of data owners or organizations to keep this data securely and encryption is the main tool used to secure information. In this paper, we will focus on different techniques and the modern application of cryptography. We will study different cryptographic schemes: symmetric, asymmetric (sometimes referred to as public key), and hybrid systems. The paper will present a comparative study for these schemes and their applications in network protocols. Moreover, we will highlight the concept of Quantum Cryptography, which takes advantage of quantum physics at the physical layer.

Keywords

Cryptography, Data Security, Decryption, Encryption, Hybrid Encryption.
Subscription Login to verify subscription
User
Notifications
Font Size


  • T. Morkel, and J. H. P. Eloff, “Encryption techniques: A timeline approach,” Information and Computer Security Architecture (ICSA) Research Group, 2004.
  • P. Kuppuswamy, and S. Q. Y. Al-Khalidi, “Hybrid encryption/decryption technique using new public key and symmetric key algorithm,” MIS Review: An International Journal, vol. 19, no. 2, 2014.
  • H. Zbinden, H. Bechmann-Pasquinucci, N. Gisin, and G. Ribordy, “Quantum cryptography,” Applied Physics B: Lasers & Optics, vol. 67, no. 6, 1998.
  • W. Stallings, Cryptography and Network Security: Principles and Practice, 6th ed., p. 287, p. 292, p. 295, p. 339, 2014.
  • W. Stallings, and L. Brown, Computer Security: Principles and Practice, 4th ed., p. 635, 2018.
  • S. D. Nasution, G. L. Ginting, Md. Syahrizal, and R. Rahim, “Data security using vigenere cipher and goldbach codes algorithm,” International Journal of Engineering Research & Technology (IJERT), vol. 6, no. 1, pp. 360-363, 2017.
  • T. Chatterjee, T. Das, S. Dey, J. Nath, and A. Nath, “Symmetric key cryptography using two-way updated-generalized vernam cipher method: TTSJA algorithm,” International Journal of Computer Applications, vol. 42, no. 1, pp. 39-42, 2012.
  • L. Knudsen, and D. Wagner, “Integral cryptanalysis,” International Workshop on Fast Software Encryption, vol. 2365, pp. 112-127, 2002.
  • E. Fujisaki, and T. Okamoto, “Secure integration of asymmetric and symmetric encryption schemes,” Journal of Cryptology, vol. 26, no. 1, pp. 80-101, 2013.
  • S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4,” International Workshop on Selected Areas in Cryptography, vol. 2259, pp. 1-24, 2001.
  • E. F. Schaefer, “A simplified data encryption standard algorithm,” Cryptologia, vol. 20, no. 1, pp. 77-84, 1996.
  • H. Simon, “Advanced encryption standard (AES),” Network Security, vol. 12, pp. 8-12, 2009.
  • S. Burnett, and S. Paine, RSA Security’s Official Guide to Cryptography, McGraw-Hill, Inc., 2001.
  • D. W. Davies, “Applying the RSA digital signature to electronic mail,” Computer, vol. 16, no. 2, pp. 55-62, 1983.
  • M. Steiner, G. Tsudik, and M. Waidner, “Diffie-Hellman key distribution extended to group communication,” CCS 1996: Proc. of 3rd ACM Conf. on Computer and Communications Security, pp. 31-37, 1996.
  • D. Hankerson, and A. Menezes, Elliptic Curve Cryptography, Springer US, 2011.
  • J. P. Aumasson, L. Henzen, W. Meier, and R. C. W. Phan, “Sha-3 proposal blake,” Submission to NIST 92, 2008.
  • B. M. Jakobsson, and A. Juels, “Executable digital cash for electronic commerce,” U.S. Patent 6,157, 920, Dec. 5, 2000.
  • G. Saju, and M. P. Deepika, “DNA cryptography: New field of cryptography,” Journal of Network and Information Security, vol. 6, no. 1, pp. 30-33, 2018.
  • M. P. K. Kishore, and S. Budhiraju, “Hybrid cryptosystem using cellular automata transformations on graphs,” Journal of Network and Information Security, vol. 4, no. 2, pp. 11-18, 2016.

Abstract Views: 125

PDF Views: 0




  • Modern Cryptographic Schemes: Applications and Comparative Study

Abstract Views: 125  |  PDF Views: 0

Authors

Julius O. Olwenyi
St. Mary’s University, San Antonio, TX, United States
Aby Tino Thomas
St. Mary’s University, San Antonio, TX, United States
Ayad Barsoum
St. Mary’s University, San Antonio, TX, United States

Abstract


Cryptography and encryption have been used for secure communication. In the modern world, cryptography is a very important tool for protecting information in computer systems. With the invention of the World Wide Web or Internet, computer systems are highly interconnected and accessible from any part of the world. As more systems get interconnected, more threat actors try to gain access to critical information stored on the network. It is the responsibility of data owners or organizations to keep this data securely and encryption is the main tool used to secure information. In this paper, we will focus on different techniques and the modern application of cryptography. We will study different cryptographic schemes: symmetric, asymmetric (sometimes referred to as public key), and hybrid systems. The paper will present a comparative study for these schemes and their applications in network protocols. Moreover, we will highlight the concept of Quantum Cryptography, which takes advantage of quantum physics at the physical layer.

Keywords


Cryptography, Data Security, Decryption, Encryption, Hybrid Encryption.

References