Explore chapters and articles related to this topic
Key Management
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
The concept of the cryptographic key system is not new; it was started way back thousands of years ago. Basically, cryptography is an art which is considered to be born along with the art of writing. The term “cryptography” was formed by combining two Greek words “Krypto” and “Graphene” which means secret writing. The roots of cryptography can be very much found in Egyptian and Roman civilizations. In Egyptian civilization, the Egyptians used to communicate with each other through messages written in “hieroglyph” writing system which is an old cryptographic technique. The messages written in hieroglyph were only understood by the scribes who used to transmit messages to the other end on behalf of the king. Similarly, the Romans used a popular Caesar cipher method to transmit the messages, and the first recorded use of Caesar cipher was by Julius Caesar, in which the plaintext characters are transformed monoalphabetically. Each character in the plaintext was transformed or shifts down by three characters alphabetically. The history of cryptography has witnessed many changes and can be found in the literature (Kahn, 1996; Singh, 2000; d’Agapeyeff, 2016). Till 1970s, cryptography was mostly used by the government agencies, but with the two major developments—public-key cryptography and the designing of Data Encryption Standards (FIPS PUB, 1999)—the nature of cryptography was completely changed and has brought them in the public domain (Davies, 1997).
HMM Applications
Published in Mark Stamp, Introduction to Machine Learning with Applications in Information Security, 2017
A simple substitution cipher is based on a fixed permutation of the plaintext characters. For example, in the well-known Caesar’s cipher,4 a message is encrypted by substituting the letter that is 3 positions ahead in the alphabet. In general, any permutation of the alphabet can serve as a simple substitution key [137].
A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
Published in Cybernetics and Systems, 2023
Ozgu Can, Fursan Thabit, Asia Othman Aljahdali, Sharaf Al-Homdy, Hoda A. Alkhzaimi
The authors presented a secure cloud data encryption technique that uses a Hybrid Algorithm to encrypt data (HVCEGA: Vigenere and Caesar Cipher Encryption Algorithm and Genetic Algorithm- HVCEGA). Implementing a protected non-repeatable key, a hybrid method combining several techniques, is more dependable and robust enough to ensure data security throughout processing and storage (generated by a one-time pad) (Pawar and Mathai 2016).