Tag: Cryptography

Science Press Release Distribution Services

Assessment of Copyright Protection Using Watermarking and Cryptography for Online Text Information

Information and security are two factors that are interdependent. To reach its relevance, information security has evolved into a global issue that necessitates a variety of tools, regulations, and assurance of technologies against any relevant security concerns. Thousands of writers are being drawn to the internet flood, which offers a flexible means of disseminating online…
Read more

November 24, 2021 0

Significant Study of Data Encryption and Steganography

The usage of the internet is increasing over the world these days, making security a big worry for consumers. Any information that is saved on a digital platform is referred to as data. The safeguarding of data is what security is all about. Data security refers to the use of digital safeguards to secure data…
Read more

October 22, 2021 0

Fast Approach to Factorize Odd Integers: An algorithm Based Study

The paper proves that an odd composite integer N can be factorized in O ((log2N)4) bit operations if N = pq, the divisor q is of the form 2au +1 or 2au -1 with u being an odd integer and α being a positive integer and the other divisor p satisfies 1 < p <…
Read more

September 17, 2021 0

New Approach in Cryptography Using RC4 Protocol

In cryptography, the RC4 protocol is the most widely used. The goal of this project is to investigate the efficient design of the RC4 stream cypher and to propose an efficient cypher architecture. The loop unrolling and pipeline concepts were used to generate two RC4 key stream bytes every clock cycle. The design is compared…
Read more

September 14, 2021 0

End-to-end Secured Fiber Optic Communication Using a Novel Encryption Algorithm

Fiber optic communication has become increasingly popular in recent decades due to its several advantages over traditional cable connection. Fiber optic connectivity enables for a download speed of 100 Mb/s and a fast upload speed with little latency. Despite the fact that fibre optics can send large volumes of data across long distances quickly, it…
Read more

September 3, 2021 0

Determination of Information Security Using Cryptography and Image Steganography

For their own vested interests, hackers are frequently willing to hack secret documents. Establishing a secure relationship between the secret message and image quality is the most difficult task. To prevent illegal attacks by an unknown person, the suggested approach combines cryptography and visual steganography techniques. Image and message security will be enabled by this…
Read more

July 15, 2021 0

Extending Wiener’s Extension to RSA-Like Cryptosystems over Elliptic Curves: Advanced Study

The studies on Wiener’s attack on RSA with small deciphering exponents led to the refinement of attack bounds on the deciphering exponent in the paper “Revisiting Wiener’s Attack – New Weak Keys in RSA” by Subhamoy Maitra and Santanu Sarkar. Further in the paper “ Extending The Wiener’s Attack to RSA-Type Cryptosystem” by R. G.…
Read more

August 25, 2020 0

Cryptography in Mathematics Teaching

Cryptography is of great importance to people of all generations and is presented as an application of mathematical sciences. On the other way, giving mathematics as basics of cryptography reduces the application of mathematical insights to the message “Cryptography contains Mathematics”. This paper introduces cryptography from Caesar Cipher to Public Key Cryptography with simple examples.…
Read more

August 21, 2020 0