• Corpus ID: 2194338

Decrypted secrets - methods and maxims of cryptology

@inproceedings{Bauer1997DecryptedS,
  title={Decrypted secrets - methods and maxims of cryptology},
  author={Friedrich L. Bauer},
  year={1997}
}
From the Publisher: Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses -- cryptography. The second part deals… 

Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial

Basic Concepts in Cryptology serves as an introduction to modern cryptographic methods, and presents public key cryptosystems, which make it possible to protect data without a prearranged key.

Cryptographic Primitives

Algorithms related mostly to RSA, primality testing, and factoring attacks, as opposed to discrete logs and/or elliptic curves are emphasized, and only simple naive forms of protocol-ideas rather than refined forms are given.

A Smart Technique :

This paper introduces what steganography is and what kind of applications can be expected and can be said to protect both messages and communicating parties.

A Search-Based Tool for the Automated Cryptanalysis of Classical Ciphers

A flexible software tool is constructed to perform automated cryptanalysis on texts encrypted with various kinds of classical ciphers, expressly designed to support the tailoring of cryptanalysis to particular styles of ciphertext, featuring an extensible framework for defining cipher and supporting different evaluation heuristics and optimisation algorithms.

A New Approach to Optimum Steganographic Algorithm for Secure Image

A new type of two encryption were used namely Advanced Encryption Standard (AES) and Least Significant Bit (LSB) are used and the needs of optimum steganographic algorithm are identified and the steganography methods that are suitable for specific applications are represented.

Decryption of historical manuscripts: the DECRYPT project

The DECRYPT project is described, aiming at the creation of resources and tools for historical cryptology by bringing the expertise of various disciplines together for collecting data, exchanging methods for faster progress to transcribe, decrypt and contextualize historical encrypted manuscripts.

SecureString 3.0 - A Cryptosystem for Blind Computing on Encrypted Character Strings

This paper ameliorates the well-known cryptosystem SecureStringi¾ź2.0 concerning privacy through pangram ciphertexts and referring integrity through secret sharing and facilities blind computing on encrypted character strings through an untrusted host.

On the Power and Usability of Quantum Cryptography

The limitations of quantum cryptography are analyzed and a security framework model which is based on quantum entanglement is used to perform an efficient data encryption of short messages.

On the power of quantum cryptography and computers

  • H. A. E. ZoukaMustafa M. Hosni
  • Computer Science, Mathematics
    2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
  • 2014
A security framework model for quantum cryptography system which is based on the physical properties of light particles is proposed and all security requirements to assist in ensuring confidentiality between communicating parties are incorporated.

Some Notes on a Formal Algebraic Structure of Cryptology

This framework is enriched by adding what the authors call pre-cryptological operations which they show as a necessary complement to the entire structure of cryptology and believe that it is improved the diversity of questions related to the meaning, the fundamentals, the statute itself, and the possibilities of cryptological science.
...