Explore chapters and articles related to this topic
Role of Cryptography and Its Challenges in Integrating Secured IoT Products
Published in S. Velliangiri, Sathish A. P. Kumar, P. Karthikeyan, Internet of Things, 2020
D. Citharthan, M. Varatharaj, D. Palanivel Rajan
Cryptology is a study of encryption and decryption. Encryption is a technique used to convert plain (readable) text to cipher (unreadable) text and, decryption is a technique used to convert cipher (unreadable) text to plain (readable) text. There are two methods of encryption, namely symmetric encryption and asymmetric encryption. Symmetric encryption uses symmetric keys for encryption as well as decryption. Asymmetric encryption uses two independent (asymmetric) keys, namely public key and private key. In asymmetric encryption, any one of the keys will be used for encryption, and another key will be used for decryption. Before sending any plain text to the IoT device, it will be encrypted using a symmetric or asymmetric key and converted to cipher text in the sender side. On the receiver side, the cipher text is decrypted using the same symmetric key or asymmetric key pair and converted to plain text. Symmetric encryption is faster than asymmetric encryption. But the problem is that symmetric keys have to store securely, and secure channel is required to transfer the symmetric key. So, combining the symmetric and asymmetric encryption methods will be more efficient in IoT product [1]. Asymmetric encryption is used in the key deployment and can be used to encrypt communication. Symmetric encryption is used where performance is required or where the data has to transmit faster.
Key Management
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
Cryptography is both an art and science which transform the information into a form which is secure and immune to attacks. The components of cryptography include a plaintextwhich is the original text, the encryption algorithm that encrypts the plaintext, ciphertext which is formed after the encryption of the plaintext, and the decryption algorithm which decrypts the ciphertext into the plaintext. Encryption and decryption algorithms are sometimes referred to as ciphers. In the cryptographic technique, ciphers use keys to operate on the cryptographic algorithms to secure the messages. Keys are nothing but the numbers which are kept secret, and ciphers use them to encrypt and decrypt the messages by using encryption and decryption keys, respectively.
Chaos-Based Encryption for Digital Image and Video
Published in Borko Furht, Darko Kirovski, Multimedia Encryption and Authentication Techniques and Applications, 2006
Shujun Li, Guanrong Chen, Xuan Zheng
An encryption system is also called a cipher or a cryptosystem. The message for encryption is called plaintext, and the encrypted message is called ciphertext. Denote the plaintext and the ciphertext by P and C, respectively. The encryption procedure of a cipher can be described as C = EKe(P), where Ke is the encryption key and E(·) is the encryption function. Similarly, the decryption procedure is P = DKd(C), where Kd is the decryption key and D(·) is the decryption function. Following Kerckhoffs’ principle [1], the security of a cipher should only rely on the decryption key Kd, because adversaries can recover the plaintext from the observed ciphertext once they get Kd. See Figure 4.1 for a diagrammatic view of a cipher.
Deciphering the Hermeticae Philosophiae Medulla: Textual Cultures of Alchemical Secrecy
Published in Ambix, 2023
Megan Piorko, Sarah Lang, Richard Bean
The cipher contained in Sloane MS 1902 is a polyalphabetic substitution cipher type, which consists of substituting one letter for another following a predetermined scheme.27 Simple substitution ciphers are monoalphabetic, meaning that a fixed set of numbers, symbols, or letters are assigned to the alphabet of the plaintext, in which there is a single corresponding symbol attached to each letter in the alphabet that does not change throughout the ciphertext. Monoalphabetic ciphers were historically the most widely used method of textual encryption, despite being especially vulnerable to frequency analysis because the statistical letter frequencies are distinctive and the substitutions constant. One means of complicating a substitution cipher, for the purpose of added secrecy, is through the use of several alphabetic tables instead of one, adding variation to the substitutions.28
Hybrid Elliptic Curve Cryptographic Approach for Data Privacy and Authentication in Secured Map Reduce Layer (SMR) for Optimized CPU Utilization
Published in IETE Journal of Research, 2023
Arogya Presskila Xavier, Ramesh Kesavan
Another essential factor is the encryption and decryption of data privacy in secure records. Which, cryptography is used to provide data integrity by hidden printing. It consists of two steps, Encrypting and Decrypting [11]. The plain text is converted into Cipher text's by the term called encryption; vice versa, the Ciphertext is converted into a plain text called decryption. Symmetric and asymmetric approaches are typical types of cryptographic algorithms that were used. In symmetric-key cryptography, only one key is used for encryption of plain text and decryption of chipper text [12]. Some features do not require special properties, k-length strings, which are automatically chosen. The encryption process is using a public key in asymmetric key cryptography and the private key is used in the receiver position for decryption of chipper text is called Public Key cryptography [13]. We provide two keys Public Key and Private Key for this methodology. Elliptic curve cryptography (ECC) is an important protection aspect of current science. Compared to all cryptography approaches, it offers comprehensive protection [14,15].
LFSS-KF: lightweight fast real-time security standards with key fusion for surveillance videos
Published in The Imaging Science Journal, 2022
Chandan Kumar, Shailendra Singh
Block ciphers and stream ciphers are the two types of crypto ciphers. The stream cipher changes plain text to cipher text by using one bit at a time. Thus, they are comparatively slow in processing, whereas the block cipher translates plain text into cipher text one text block of data. In a stream cipher, it is mandatory to have the same size of the key and data. Every bit of input text data is encrypted using just a different key in stream cipher. As a result, the same key is utilized to encrypt all data blocks in the block ciphers. The block ciphers are more suitable for real-time applications and are lightweight too. The examples of the stream and block ciphers considered in the table are based on the image/video security uses. Based on the key structure used, block ciphers can be preferred over stream ciphers for VS context.