• Corpus ID: 16811899

The Art of Cryptology: From Ancient Number System to Strange Number System

@inproceedings{Das2013TheAO,
  title={The Art of Cryptology: From Ancient Number System to Strange Number System},
  author={Debasis Das and Ujwal A. Lanjewar and Sanjiv Sharma},
  year={2013}
}
From the Rosetta stone to cryptography using Strange Number System, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. The paper begins by tracing the development of cryptology from that of an arcane practice used, for example, ancient Egyptian hieroglyphics, to the modern scientific method that is cryptography using Strange Number System. This paper… 

AN APPROACH OF HYBRID TRANSPOSITION METHOD BASED ON ASCII VALUE IN CRYPTOGRAPHY

A hybrid cryptography method is proposed which uses both substitution and transposition technics to secure the plain text and the forte of the method is its all four keys.

Cryptosystems using an improving hiding technique based on latin square and magic square

The proposed technique is robust against disclosing the repetition encrypted data based on the result of Avalanche Effect in an accepted ratio and the results of the output of the proposed encryption method have acceptable randomness based of the p-values of the NIST randomness tests.

NHSKCA: A New Heuristic for Symmetric Key Cryptographic Algorithm

  • Ira Nath
  • Computer Science, Mathematics
  • 2017
Algorithms for both encryption and decryption are provided here and a new symmetric key algorithm is proposed that combines RSA, DES, RSA, MD5, etc.

Comparative Analysis of Hash Function and Symmetric Algorithm for Data Security in Wireless Sensor Networks

System security is the imperative part in data security since it is in charge of securing all information went through system and arrange security has turned out to be more critical for exchange of information.

NEHSC: A New Efficient Heuristic for Symmetric Key Cryptography

Usually, cryptography is regarding developing and analysis rules that can stop combatants or the peoples from studying confidential information; different directions of message safety such as information privacy, validation and non-repudiation are essential part of current cryptography techniques.

BEHSC: A New Efficient Heuristic for Symmetric Key Cryptography

Cryptography is the method to revise of various methods for maintaining security issues for communication in the presence of third parties called combatants, about constructing and analysis protocols that prevent third parties or the public from reading private messages.

A Review on Cryptography Algorithms, Attacks and Encryption Tools

Three basic cryptography algorithms are reviewed and basic tools of encryption for secure messaging, transactions and connectivity are pointed out.

Physical Layer Security in Wireless Sensor Networks

This thesis proposes a fix chaotic-DSSS system, and investigates its secrecy performance, and proposes a new security attack called Syncim, which sends its fake synchronization pilot signals and makes the receiver (victim) sync with the adversary instead of the legitimated transmitter.

Smart Communication and Security by Key Distribution in Multicast Environment

A unique way of safeguarding network systems using cryptographic keys, as well as a fuzzy-based technique for improving security by reducing symmetric and asymmetric key overhead are proposed.

International Journal of Innovative Technology and Exploring Engineering (IJITEE)

In this proposal various papers are reviewed for Energy and Spectral Efficiency performance in Massive MIMO Technology through different algorithms and parameter comparisons are made to identify the better algorithms in terms of EE and SE to achieve the higher data transmission rates, BER, mitigating the inter Noise interference.

References

SHOWING 1-10 OF 24 REFERENCES

Origins of Cryptology: the Arab Contributions

Factors behind the emergence and advancement of Arab cryptology are discussed and the specific contributions of some Arab cryptologists are highlighted based on newly discovered documents.

Survey Paper: Cryptography Is The Science Of Information Security

The range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage.

Public-Key Cryptography

  • A. Salomaa
  • Computer Science, Mathematics
    EATCS Monographs on Theoretical Computer Science
  • 1990
This book gives a broad overview of public-key cryptography - its essence and advantages, various public- key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis.

Strange Number System: An Enhancing Tool for Data Encryption and Decryption

This paper proposes a better data encoding and decoding strategy, which will offer better security towards all possible ways of attacks while data transmission.

Cryptology : an introduction to the art and science of enciphering, encrypting, concealing, hiding, and safeguarding described without any arcane skullduggery but not without cunning waggery for the delectation and instruction of the general public

A selection of quotes from Shakespeare's Hamlet, including the famous refrain, "No one knows, With glee I claim, that Rumpelstilskin is my name".

A primer on cryptography in communications

The development of unbreakable cipher keys, cipher-key distribution, identification of malicious actors, source authentication, physical-link signature identification, countermeasures, and so forth has been the major thrust of research efforts with regard to cyber-security.

Cryptanalysis of Block Ciphers with Overdefined Systems of Equations

A new criterion for design of S-boxes in block ciphers should not be describable by a system of polynomial equations that is too small or too overdefined, and this is suggested for both Serpent and Rijndael.

Public Key Cryptography

  • J. Seberry
  • Computer Science, Mathematics
    Lecture Notes in Computer Science
  • 2000
This talk focuses on the RSA Public Key Cryptosystem, a cryptographic system in which each encryption process is governed by not one but two keys, which allows one of the keys to be made public while its inverse is kept secret, giving the systems their name.

Basic Methods of Cryptography

This book will be of value to advanced students and researchers involved in data protection and information processing, especially electrical engineers and people working in informatics and computer science.

A brief history of cryptography

  • D. Davies
  • Computer Science, Mathematics
    Inf. Secur. Tech. Rep.
  • 1997