Theoretical Background of Cryptography
Main Article Content
Abstract
Cryptography is the practice of secure communication and the study of secure communication techniques. The theoretical foundations of cryptography include concepts such as cryptography, secure key exchange, digital signatures, and authentication. These technologies are used to protect the confidentiality, integrity, and reliability of information while it is being transmitted over a network or stored in digital form. The core of encryption is the concept of an encryption algorithm, which is a set of mathematical rules used to encrypt and decrypt data. The security of a cryptographic system depends on the strength of the underlying algorithm and the confidentiality of the key used to encrypt and decrypt the data. In this paper, Cryptography concepts and modern techniques are reviewed for types of encryption algorithms and the best ones, and many types of attacks and their impact on the encryption process
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
Abdullah, Ako Muhamad. "Advanced encryption standard (AES) algorithm to encrypt and decrypt data." Cryptography and Network Security 16 (2017): 1-11.
Gaži, Peter, and Stefano Tessaro. "Secret-key cryptography from ideal primitives: A systematic overview." 2015 IEEE Information Theory Workshop (ITW). IEEE, 2015.
Dutta, Indira Kalyan, Bhaskar Ghosh, and Magdy Bayoumi. "Lightweight cryptography for internet of insecure things: A survey." 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2019.
Tayal, Sandeep, et al. "A review paper on network security and cryptography." Advances in Computational Sciences and Technology 10.5 (2017): 763-770.
Leng, Jiewu, et al. "Blockchain security: A survey of techniques and research directions." IEEE Transactions on Services Computing (2020).
Shetty, Vaishnavi S., et al. "A survey on performance analysis of block cipher algorithms." 2020 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2020.
Mehmood, Muhammad Sheraz, et al. "A comprehensive literature review of data encryption techniques in cloud computing and IoT environment." 2019 8th International Conference on Information and Communication Technologies (ICICT). IEEE, 2019.
Al-Absi, Mohammed Abdulhakim, et al. "Cryptography Survey of DSS and DSA." Advances in Materials and Manufacturing Engineering. Springer, Singapore, 2020. 661-669.
Mallouli, Fatma, et al. "A survey on cryptography: comparative study between RSA vs ECC algorithms, and RSA vs El-Gamal algorithms." 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE, 2019.
Habek, Muhammed, et al. "Digital Image Encryption Using Elliptic Curve Cryptography: A Review." 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). IEEE, 2022.
Jassim, Sameeh A., and Alaa K. Farhan. "A survey on stream ciphers for constrained environments." 2021 1st Babylon International Conference on Information Technology and Science (BICITS). IEEE, 2021.
Yazdeen, Abdulmajeed Adil, et al. "FPGA implementations for data encryption and decryption via concurrent and parallel computation: A review." Qubahan Academic Journal 1.2 (2021): 8-16.
Dutta, Indira Kalyan, Bhaskar Ghosh, and Magdy Bayoumi. "Lightweight cryptography for internet of insecure things: A survey." 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2019.
Abdullah, Ako Muhamad. "Advanced encryption standard (AES) algorithm to encrypt and decrypt data." Cryptography and Network Security 16 (2017): 1-11.
Bozdal, Mehmet, Mohammad Samie, and Ian Jennions. "A survey on can bus protocol: Attacks, challenges, and potential solutions." 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE). IEEE, 2018.
Hosam, Osama. "Attacking image watermarking and steganography-a survey." International Journal of Information Technology and Computer Science 11.3 (2019): 23-37.
Huseinović, Alvin, et al. "A survey of denial-of-service attacks and solutions in the smart grid." IEEE Access 8 (2020): 177447-177470.
Salahdine, Fatima, and Naima Kaabouch. "Social engineering attacks: A survey." Future Internet 11.4 (2019): 89.
Patil, Hemant A., and Madhu R. Kamble. "A survey on replay attack detection for automatic speaker verification (ASV) system." 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, 2018.
Patil, Hemant A., and Madhu R. Kamble. "A survey on replay attack detection for automatic speaker verification (ASV) system." 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, 2018.
Patil, Hemant A., and Madhu R. Kamble. "A survey on replay attack detection for automatic speaker verification (ASV) system." 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, 2018.
Patil, Hemant A., and Madhu R. Kamble. "A survey on replay attack detection for automatic speaker verification (ASV) system." 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, 2018.
Patil, Hemant A., and Madhu R. Kamble. "A survey on replay attack detection for automatic speaker verification (ASV) system." 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, 2018.
Mehrotra, Tushar. "A review on attack in wireless and computer networking." Asian Journal of Multidimensional Research 10.10 (2021): 1457-1463.
Mallik, Avijit. "Man-in-the-middle-attack: Understanding in simple words." Cyberspace: Jurnal Pendidikan Teknologi Informasi 2.2 (2019): 109-134.
Akram, Ayaz, et al. "Meet the Sherlock Holmes’ of side channel leakage: A survey of cache SCA detection techniques." IEEE Access 8 (2020): 70836-70860.
Mansoor, Rusul, Dalal N. Hamood, and Alaa Kadhim Farhan. "The Image Steganography Based on Chaos Function and Randomize Function: ISBOCFARF." Iraqi Journal For Computer Science and Mathematics 4.1 (2023).
Shanmugham, Shanthi Rekha, and Saravanan Paramasivam. "Survey on power analysis attacks and its impact on intelligent sensor networks." IET Wireless Sensor Systems 8.6 (2018): 295-304.
Mansoor, Rusul. "The Steganography Based On Chaotic System for Random LSB Positions: SBOCSFRLSBP." Wasit Journal of Computer and Mathematics Sciences 1.4 (2022): 171-193.
Wu, Huazheng, et al. "Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination based deep-learning correlography." Optics and Lasers in Engineering 138 (2021): 106454.
Al-Amri, Rusul Mansoor, Dalal N. Hamood, and Alaa Kadhim Farhan. "Generation Initial Key of the AES Algorithm based on Randomized and C