Explore chapters and articles related to this topic
A Novel LC-DEH Algorithm to Enhance Efficiency and Security for Reliable Data Transmission in Blockchain with IoT-Based Healthcare Systems
Published in Ambikapathy, R. Shobana, Logavani, Dharmasa, Reinvention of Health Applications with IoT, 2022
G. Uganya, Radhika Baskar, M. Balasaraswathi, N. Vijayaraj, D. Rajalakshmi
Zaru et al. did a general survey on cryptography. This paper discussed how cryptography is used to achieve some of the goals like confidentiality, data integrity, authentication, etc. They concluded that Kerberos is far better than PGP because it is scalable and its scope could be very large [50]. Rajasekar et al. proposed a multifactor signcryption scheme for secure authentication that is achieved by the combination of hyperelliptic curve cryptography and bio-hash function. The proposed method uses multiple-factor authentication to make more secure personal data. They have used signcryption which is a lightweight cryptography method to minimize biometric recognition error, dictionary attack, DoS attack, impersonation attack, and so on [51]. Jyothi et al. analysed cryptography encryption of network security. In this work, they have done a detailed survey to find the best way to secure data. At last, on comparing all the techniques, they found cryptography helps in safeguarding the confidential personal information [52].
Cryptography and Steganography Techniques
Published in Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta, Information Security and Optimization, 2020
Over the digital platform, there has been a continuous rise in information security threats over the past decades and this has become a major bottleneck for security professionals. Steganography and cryptography are considered as best practices to abolish this hazard. In a recent scenario, researchers are coming up with various blended techniques, by hybridization of both techniques. The hybridization of techniques enhances the level of security. In the cryptographic process, data is encrypted by a process known as SCMACS and symmetric key methodology, with both the source and the recipient sharing the identical key in the process of encoding/decoding. On the other hand, the popular and preferred LSB technique has been used for steganography (Dhamija and Dhaka, 2015). Another researcher proposed an extremely secure steganographic technique that combines Hyperelliptic Curve cryptography with a DNA sequence. It provides the advantages of steganography and DNA cryptography and affords an extreme level of secure interaction (Vijayakumar, 2016).
Algebraic Geometry
Published in Paul L. Goethals, Natalie M. Scala, Daniel T. Bennett, Mathematics in Cyber Research, 2022
The field of elliptic curve cryptography is a well-established field, so as we look to push the boundary of knowledge on this subject, we look to a field of mathematics that is very similar, hyperelliptic curve cryptography. Elliptic curves are known as genus one curves. Curves of higher order are higher genus curves. Hyperelliptic curves of genus two and three are known to be good for cryptography purposes, while there are known methods of attacks for curves of higher genus. Hence, for cryptographic purposes, we are interested in studying only curves of genus 2 and 3.
Hyperelliptic Curve Diffie–Hellman-Based Two-Server Password-Only Authenticated Key Exchange Protocol for Edge Computing Systems
Published in IETE Journal of Research, 2021
K. Anitha Kumari, T. P. Kamatchi, R. Senthil Prabha, Bharath K. Samanthula
To handle and process the explosive growth of data efficiently and to combat the challenging security issues, cloud computing is not suffice and is considered as an invisible paradigm. Thus, in order to improve the performance, protect the framework against hazardous attacks, resolve key challenges faced by data analysts, and to gain inputs immediately, a fast-paced computing paradigm is essential to perform the operations effectively. Thus, edge computing receives widespread attention and adoption recently [1]. It enables manifold devices to get closer for data processing, especially while dealing with real-time data. However, as the devices are growing exponentially, it leads to new horizons of attack vectors. As a consequence, protecting the data and authenticating the edge devices is considered as a primary mandate. Regrettably, 70% of edge devices are not mandated authentication and 60% are not encrypting the data properly [2]. To achieve this, digital signatures may be considered as a wise choice; however, in most of the cases, it fails to provide mutual authentication and paves a way to create bogus certificates. As an alternate, for better reliability Password-Authenticated key Exchange (PAKE) protocol is considered judiciously. In PAKE protocol, communicating parties actively collaborate with each other in establishing a session key based on the password information [3]. All existing single-server PAKE protocols are accountable to server compromise threats/attacks [4]. Thus, two-server password-based authentication using Hyperelliptic Curve Cryptography (HECC) is devised where two servers join together to authenticate a machine/device based upon the password. If one server is compromised, the attacker still cannot pretend to be the client (machine/device) with the information revealed from the compromised server. PAKE is implemented using hyperelliptic curve cryptography to avoid offline dictionary attacks and impersonation attacks. Hyper elliptic curves ensure equivalent level of security as that of elliptic curves with shorter key length. Researches disclose that hyper elliptic curves over prime fields with genus 2 or 3 perform better than elliptic curves. To improve the secure communication between the parties involved in the system hyperelliptic curve is preferred than elliptic curves.