Explore chapters and articles related to this topic
A Comparative Analysis of Classical Cryptography versus Quantum Cryptography for Web of Medical Things (WoMT)
Published in Aboul Ella Hassanien, Nilanjan Dey, Surekha Borra, Medical Big Data and Internet of Medical Things, 2018
K. Anitha Kumari, G. Sudha Sadasivam
The asymmetric key technique uses two keys, namely, private and public. The public key and the private key are used in the encryption and decryption process. Albeit different, the keys are mathematically connected and ascertaining the private key from the public key is infeasible. Most of the public key algorithms are based on discrete logarithm/integer factorization/elliptic curve relationships for which no efficient solution exists till now. Due to this, it is commonly applied in authentication protocols, key exchange processes and in sharing secrets. Diffie–Hellman (DH) key exchange protocol, digital signature standard (DSS), digital signature algorithm (DSA), ElGamal cryptosystem, ECC schemes, Rivest–Shamir–Adleman (RSA) scheme and Cramer–Shoup cryptosystem are some examples of public key cryptography. To perform the key exchange process, asymmetric key cryptography is highly preferred as it is robust against attacks. To transmit data effectively, the symmetric key algorithm is commonly used. Combining the advantages of a public key cryptosystem for key encapsulation and symmetric key cryptosystem for data encapsulation is referred to as a hybrid cryptosystem. Pretty good privacy (PGP) and secure sockets layer (SSL)/transport layer security (TLS) schemes utilize this procedure.
Artificial Intelligence Oriented Information Hiding and Multimedia Forensics
Published in IETE Technical Review, 2021
Chuan Qin, Zhenxing Qian, Xiaolong Li, Jinwei Wang
The paper, entitled “Image Cryptosystem for Visually Meaningful Encryption Based on Fractal Graph Generating”, aims to encrypt image to the visually meaningful encrypted image via fractal graph generating. According to fractal graph generation parameters, the receiver can obtain the plaintext image from fractal image reversely. According to pixel distributions of plaintext images, different fractal transformations can be used to generate different fractal images, which can improve the security of the proposed image cryptosystem. The paper, entitled “Reversible Data Hiding in Encrypted Images based on Hybrid Cryptosystem”, tries to achieve a low expansion rate through a hybrid encryption of Paillier cryptosystem and stream cipher. In this method, original image is first divided into two kinds of blocks, which are encrypted by different ways. Secret data is reversibly hidden into the encrypted image via modifying ciphertexts, and the hiding capacity of these two kinds of blocks can be decided based on an adaptive optimization algorithm. Results show that the method can not only have low expansion rate but also achieves better rate-distortion performance than some reported methods.