A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography

  • Published: 27 March 2023
  • Volume 129 , pages 2291–2318, ( 2023 )

Cite this article

  • Fredy Varghese 1 , 2 &
  • P. Sasikala 3  

681 Accesses

9 Citations

Explore all metrics

During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information technology companies, industries, and other fields. Nowadays, all data are transmitted over the Internet, which needs high protection for transmitting the original data from source to destination. In order to secure digital communication, cryptography and steganography methods are used to achieve data security over insecure and open networks like the Internet. Cryptography is the method of encrypting secret information in an unreadable structure. Based on the cryptography method, the original message can be distorted before data transmission. On the other hand, steganography covers secret data such as audio, image, text, and video. It can hide the message while transmitting the original information from one end to another. The data combines images, texts, audio and videos, which are communicated worldwide through the Internet. This review paper gives an analysis based on the concept of cryptography and steganography. It also presents a comparative approach using several encryption algorithms with several factors such as block size, key size, encryption speed, memory usage, and security level.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

cryptography techniques research papers

Similar content being viewed by others

cryptography techniques research papers

Image encryption techniques: A comprehensive review

Hoshang Kolivand, Sabah Fadhel Hamood, … Mohd Shafry Rahim

cryptography techniques research papers

Video steganography: recent advances and challenges

Jayakanth Kunhoth, Nandhini Subramanian, … Ahmed Bouridane

cryptography techniques research papers

PSNR vs SSIM: imperceptibility quality assessment for image steganography

De Rosal Igantius Moses Setiadi

Availability of Data and Materials

No data Availability.

Balaji, R., & Naveen, G. (2011). Secure data transmission using video Steganography. In  2011 IEEE International Conference on Electro/Information Technology , IEEE, pp. 1–5.

Vijayakumar, P., Azees, M., Kannan, A., & Deborah, L. J. (2015). Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17 (4), 1015–1028.

Article   Google Scholar  

Ozdemir, S., & Xiao, Y. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks, 53 (12), 2022–2037.

Article   MATH   Google Scholar  

Zhang, X. (2011). Reversible data hiding in encrypted image. IEEE Signal Processing Letters, 18 (4), 255–258.

Jung, K. H., & Yoo, K. Y. (2009). Data hiding method using image interpolation. Computer Standards and Interfaces, 31 (2), 465–470.

Zhou, X., & Tang, X. (2011). Research and implementation of RSA algorithm for encryption and decryption. In  Proceedings of 2011 6th international forum on strategic technology IEEE , vol. 2, pp. 1118–1121.

Elbirt, A. J., & Paar, C. (2005). An instruction-level distributed processor for symmetric-key cryptography. IEEE Transactions on Parallel and distributed Systems, 16 (5), 468–480.

Chatterjee, D., Nath, J., Dasgupta, S., & Nath, A. (2011). A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm. In  2011 International conference on communication systems and network technologies , pp. 89–94. IEEE.

Nath, A., Ghosh, S., & Mallick, M. A. (2010). Symmetric Key Cryptography Using Random Key Generator. In  Security and Management , pp. 234–242.

Chandra, S., Paira, S., Alam, S. S., & Sanyal, G. (2014). A comparative survey of symmetric and asymmetric key cryptography. In  2014 international conference on electronics, communication and computational engineering (ICECCE) , IEEE, pp. 83–93.

Singh, K. K., & Dwivedi, S. (2014). Digital Watermarking using Asymmetric Key Cryptography and Spatial Domain Technique. International Journal of Advance Research in Computer Science and Management Studies, 2 (8), 1–15.

Google Scholar  

Jirwan, N., Singh, A., & Vijay, S. (2013). Review and analysis of cryptography techniques. International Journal of Scientific and Engineering Research, 4 (3), 1–6.

Wang, X., Wang, X., Zhao, J., & Zhang, Z. (2011). Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dynamics, 63 (4), 587–597.

Article   MathSciNet   Google Scholar  

Doz, Y. L., & Kosonen, M. (2010). Embedding strategic agility: A leadership agenda for accelerating business model renewal. Long range planning, 43 (2–3), 370–382.

Wu, S., Huang, J., Huang, D., & Shi, Y. Q. (2005). Efficiently self-synchronized audio watermarking for assured audio data transmission. IEEE Transactions on Broadcasting, 51 (1), 69–76.

Neumann, K., Herold, M., Hartley, A., & Schmullius, C. (2007). Comparative assessment of CORINE2000 and GLC2000: Spatial analysis of land cover data for Europe. International Journal of Applied Earth Observation and Geoinformation, 9 (4), 425–437.

Dulera, S., Jinwala, D., & Dasgupta, A. (2012). Experimenting with the novel approaches in text steganography. arXiv preprint arXiv:1203.3644  .

Thangadurai, K., & Devi, G. S. (2014). An analysis of LSB based image steganography techniques. In  2014 International Conference on Computer Communication and Informatics , IEEE, pp. 1–4.

Sun, Y., & Liu, F. (2010). Selecting cover for image steganography by correlation coefficient. In  2010 second international workshop on education technology and computer science , IEEE, vol. 2, pp. 159–162.

Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90 (3), 727–752.

Amirtharajan, R., Akila, R., & Deepikachowdavarapu, P. (2010). A comparative analysis of image steganography. International journal of computer applications, 2 (3), 41–47.

Bhowal, K., Bhattacharyya, D., Jyoti Pal, A., & Kim, T. H. (2013). A GA based audio steganography with enhanced security. Telecommunication Systems, 52 (4), 2197–2204.

Nehru, G., & Dhar, P. (2012). A detailed look of audio steganography techniques using LSB and genetic algorithm approach. International Journal of Computer Science Issues (IJCSI), 9 (1), 402.

Kumar, S., Barnali, B. A. N. D. Y. O. P. A. D. H. Y. A. Y., & Banik, G. U. P. T. A. (2012). LSB modification and phase encoding technique of audio steganography revisited. International Journal of Advanced Research in Computer and Communication Engineering, 1 (4), 1–4.

Balgurgi, P. P., & Jagtap, S. K. (2013). Audio steganography used for secure data transmission. In  Proceedings of international conference on advances in computing , Springer, New Delhi, pp. 699–706.

Matsuoka, H. (2006). Spread spectrum audio steganography using sub-band phase shifting. In  2006 International Conference on Intelligent Information Hiding and Multimedia , pp. 3–6. IEEE.

Jayaram, P., Ranganatha, H. R., & Anupama, H. S. (2011). Information hiding using audio steganography–a survey. The International Journal of Multimedia and Its Applications (IJMA), 3 , 86–96.

Mittal, A., Moorthy, A. K., & Bovik, A. C. (2012). No-reference image quality assessment in the spatial domain. IEEE Transactions on image processing, 21 (12), 4695–4708.

Article   MathSciNet   MATH   Google Scholar  

Ghobadi, A., Boroujerdizadeh, A., Yaribakht, A. H., & Karimi, R. (2013). Blind audio watermarking for tamper detection based on LSB. In  2013 15th international conference on advanced communications technology (ICACT) , IEEE, pp. 1077–1082.

Bhattacharyya, S., & Sanyal, G. (2012). Audio steganalysis of LSB audio using moments and multiple regression model. International Journal of Advances in Engineering and Technology, 3 (1), 145.

Zhao, Z., Liu, F., Luo, X., Xie, X., & Yu, L. (2012). LSB replacement steganography software detection based on model checking. In  International workshop on digital watermarking Springer, Berlin, Heidelberg , pp. 54–68.

Sabeti, V., Samavi, S., Mahdavi, M., & Shirani, S. (2007). Steganalysis of pixel-value differencing steganographic method. In  2007 IEEE pacific rim conference on communications, computers and signal processing , IEEE, 292–295.

Gutub, A. A. A. (2010). Pixel indicator technique for RGB image steganography. Journal of emerging technologies in web intelligence, 2 (1), 56–64.

Gutub, A., Ankeer, M., Abu-Ghalioun, M., Shaheen, A., & Alvi, A. (2008). Pixel indicator high capacity technique for RGB image based Steganography.

Chang, C. L., & Girod, B. (2007). Direction-adaptive discrete wavelet transform for image compression. IEEE Transactions on Image Processing, 16 (5), 1289–1302.

Ghazali, K. H., Mansor, M. F., Mustafa, M. M., & Hussain, A. (2007). Feature extraction technique using discrete wavelet transform for image classification. In  2007 5th Student Conference on Research and Development , IEEE, pp. 1–4.

Lidong, H., Wei, Z., Jun, W., & Zebin, S. (2015). Combination of contrast limited adaptive histogram equalization and discrete wavelet transform for image enhancement. IET Image Processing, 9 (10), 908–915.

Naidu, V. P. S. (2012). Discrete cosine transform based image fusion techniques. Journal of Communication, Navigation and Signal Processing, 1 (1), 35–45.

Elharar, E., Stern, A., Hadar, O., & Javidi, B. (2007). A hybrid compression method for integral images using discrete wavelet transform and discrete cosine transform. Journal of display technology, 3 (3), 321–325.

Zeng, B., & Fu, J. (2008). Directional discrete cosine transforms—A new framework for image coding. IEEE transactions on circuits and systems for video technology, 18 (3), 305–313.

Alhayani, B. S., Hamid, N., Almukhtar, F. H., Alkawak, O. A., Mahajan, H. B., Kwekha-Rashid, A. S., & Alkhayyat, A. (2022). Optimized video Internet of things using elliptic curve cryptography based encryption and decryption. Computers and Electrical Engineering, 101 , 108022.

Huang, Y., Lei, Z., Song, Z., Guo, Y., & Li, Y. (2021). A Video Steganography Scheme Based on Post-Quantum Cryptography. In  2021 IEEE international conference on information communication and software engineering (ICICSE) , IEEE, pp. 83–87.

El-Shafai, W., Almomani, I. M., & Alkhayer, A. (2021). Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access, 9 , 35004–35026.

Zhao, H., Liu, Y., Wang, Y., Liu, S., & Feng, C. (2021). A video steganography method based on transform block decision for H. 265/HEVC. IEEE Access, 9 , 55506–55521.

Chen, Y., Wang, H., Choo, K. K. R., He, P., Salcic, Z., Kaafar, M. A., & Zhang, X. (2021). DDCA: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain.  IEEE transactions on dependable and secure computing .

Suresh, M., & Sam, I. S. (2021). Exponential fractional cat swarm optimization for video steganography. Multimedia Tools and Applications, 80 (9), 13253–13270.

Keerthi, K., & Surendiran, B. (2017). Elliptic curve cryptography for secured text encryption. In  2017 International conference on circuit, power and computing technologies (ICCPCT) , IEEE, pp. 1–5.

Chauhan, S., Kumar, J., & Doegar, A. (2017). Multiple layer text security using variable block size cryptography and image steganography. In  2017 3rd international conference on computational intelligence and communication technology (CICT) , IEEE, 1–7.

Alkhudaydi, M., & Gutub, A. (2021). Securing data via cryptography and arabic text steganography. SN Computer Science, 2 (1), 1–18.

Al-Nofaie, S., Gutub, A., & Al-Ghamdi, M. (2021). Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. Journal of King Saud University-Computer and Information Sciences, 33 (8), 963–974.

Ahvanooey, M. T., Li, Q., Hou, J., Mazraeh, H. D., & Zhang, J. (2018). AITSteg: An innovative text steganography technique for hidden transmission of text message via social media. IEEE Access, 6 , 65981–65995.

Malik, A., Sikka, G., & Verma, H. K. (2017). A high capacity text steganography scheme based on LZW compression and color coding. Engineering Science and Technology, An International Journal, 20 (1), 72–79.

Sinha, N., Bhowmick, A., & Kishore, B. (2015). Encrypted information hiding using audio steganography and audio cryptography.  International Journal of Computer Applications ,  112 (5).

Socek, D., & Magliveras, S. S. (2005). General access structures in audio cryptography. In  2005 IEEE international conference on electro information technology IEEE , p. 6.

Lee, M. C., & Lau, C. Y. (2018). Three orders mixture algorithm of audio steganography combining cryptography. Journal of Information Hiding and Multimedia Signal Processing, 9 (4), 959–969.

Alhassan, S. (2021). Audio cryptography via enhanced genetic algorithm.  The International Journal of Multimedia and Its Applications (IJMA), 13.

Ali, A. H., George, L. E., Zaidan, A. A., & Mokhtar, M. R. (2018). High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimedia Tools and Applications, 77 (23), 31487–31516.

Elkandoz, M. T., & Alexan, W. (2019). Logistic tan map based audio steganography. In  2019 international conference on electrical and computing technologies and applications (ICECTA), IEEE , pp. 1–5.

Hemeida, F., Alexan, W., & Mamdouh, S. (2019). Blowfish–secured audio steganography. In  2019 novel intelligent and leading emerging sciences conference (NILES) , IEEE, vol. 1, pp. 17–20.

Tayel, M., Gamal, A., & Shawky, H. (2016). A proposed implementation method of an audio steganography technique. In  2016 18th international conference on advanced communication technology (ICACT) , IEEE, pp. 180–184.

Kar, D. C., & Mulkey, C. J. (2015). A multi-threshold based audio steganography scheme. Journal of information security and applications, 23 , 54–67.

Al-Rahal, M. S., Abi Sen, A., & Basuhil, A. A. (2016). High level security based steganoraphy in image and audio files. Journal of theoretical and Applied Information Technology, 87 (1), 29.

Naskar, P. K., & Chaudhuri, A. (2014). A secure symmetric image encryption based on bit-wise operation. International Journal of Image, Graphics and Signal Processing, 6 (2), 30.

Kalubandi, V. K. P., Vaddi, H., Ramineni, V., & Loganathan, A. (2016). A novel image encryption algorithm using AES and visual cryptography. In  2016 2Nd international conference on next generation computing technologies (NGCT) , IEEE, pp. 808–813.

Ferdush, J., Begum, M., & Mahmood, A. (2017). A new image encryption technique combining the idea of one time pad with RGB value. International Journal of Computer Applications, 178 (5), 12–15.

Wang, X., Feng, L., & Zhao, H. (2019). Fast image encryption algorithm based on parallel computing system. Information Sciences, 486 , 340–358.

Li, C., Lin, D., Lü, J., & Hao, F. (2018). Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimedia, 25 (4), 46–56. https://doi.org/10.1109/MMUL.2018.2873472

Qazanfari, K., & Safabakhsh, R. (2014). A new steganography method which preserves histogram: Generalization of LSB++. Information Sciences, 277 , 90–101.

Yuan, H. D. (2014). Secret sharing with multi-cover adaptive steganography. Information Sciences, 254 , 197–212.

Muhammad, K., Ahmad, J., Rehman, N. U., Jan, Z., & Sajjad, M. (2017). CISSKA-LSB: Color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools and Applications, 76 (6), 8597–8626.

Tavares, R., & Madeiro, F. (2016). Word-Hunt: A LSB steganography method with low expected number of modifications per pixel. IEEE Latin America Transactions, 14 (2), 1058–1064.

Nguyen, T. D., Arch-Int, S., & Arch-Int, N. (2016). An adaptive multi bit-plane image steganography using block data-hiding. Multimedia tools and applications, 75 (14), 8319–8345.

Download references

No funding is provided for the preparation of manuscript.

Author information

Authors and affiliations.

Vinayaka Mission’s Kirupananda Variyar Engineering College, Salem, Tamil Nadu, India

Fredy Varghese

Department of Computer Science, Naipunnya Institute of Management and Information Technology, Thrissur, Kerala, India

Department of Mathematics, Vinayaka Mission’s Kirupananda Variyar Engineering College, Salem, Tamil Nadu, India

P. Sasikala

You can also search for this author in PubMed   Google Scholar

Contributions

All authors have equal contributions in this work.

Corresponding author

Correspondence to Fredy Varghese .

Ethics declarations

Conflict of interest.

Authors Fredy Varghese, P. Sasikala declares that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent to Participate

All the authors involved have agreed to participate in this submitted article.

Consent to Publish

All the authors involved in this manuscript give full consent for publication of this submitted article.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Varghese, F., Sasikala, P. A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography. Wireless Pers Commun 129 , 2291–2318 (2023). https://doi.org/10.1007/s11277-023-10183-z

Download citation

Accepted : 07 February 2023

Published : 27 March 2023

Issue Date : April 2023

DOI : https://doi.org/10.1007/s11277-023-10183-z

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Cryptography
  • Steganography
  • Advanced encryption standard (AES)
  • Data hiding
  • Find a journal
  • Publish with us
  • Track your research

A New Approach of Cryptography for Data Encryption and Decryption

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Help | Advanced Search

Computer Science > Cryptography and Security

Title: post quantum cryptography: techniques, challenges, standardization, and directions for future research.

Abstract: The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. The security of asymmetric algorithms like RSA, Diffie Hellman, and ECC is based on the mathematical hardness of prime factorization and discrete logarithm. The best classical algorithms available take exponential time. Shor's factoring algorithm can solve the problems in polynomial time. Major breakthroughs in quantum computing will render all the present-day widely used asymmetric cryptosystems insecure. This paper analyzes the vulnerability of the classical cryptosystems in the context of quantum computers discusses various post-quantum cryptosystem families, discusses the status of the NIST post-quantum cryptography standardization process, and finally provides a couple of future research directions in this field.

Submission history

Access paper:.

  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

DBLP - CS Bibliography

Bibtex formatted citation.

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

IMAGES

  1. (PDF) A study on Role and Applications of Cryptography Techniques in

    cryptography techniques research papers

  2. (PDF) Overview of Cryptanalysis Techniques in Multivariate Public Key

    cryptography techniques research papers

  3. Cryptographic Techniques 1/4

    cryptography techniques research papers

  4. (PDF) Quantum Cryptography

    cryptography techniques research papers

  5. Research Papers On Cryptography: Exploring The Secrets.

    cryptography techniques research papers

  6. (PDF) A Review Paper on Cryptography of Modified Caesar Cipher

    cryptography techniques research papers

VIDEO

  1. Introduction to Cryptography

  2. Pairings in Cryptography

  3. Non-Malleable Cryptography

  4. Используйте грамотные методы шифрования

  5. The Cryptographers' Panel

  6. Ciphers Fundamentals Lab

COMMENTS

  1. (PDF) A Review Paper on Cryptography

    In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are ...

  2. A review on various cryptographic techniques & algorithms

    Cryptography is a tool to execute messages confidentiality. In Greek, the word "composing mystery" has a special meaning. The working cycle that changes through the actual message is called in plaintext as cypher text. The conversation loop, called scrambling, restores plaintext from the chip text [1] .

  3. (PDF) A Study on Cryptographic Techniques

    Cryptography is a technique that masks the. data over the channel of communication. Hiding the data to outsiders is an art. As the technology grows day by day, the need for data security over the ...

  4. Cryptography

    Cryptography, an international, peer-reviewed Open Access journal. ... Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and ...

  5. A Review Paper on Cryptography

    A Review Paper on Cryptography Abstract: With the internet having reached a level that merges with our lives, growing explosively during the last several decades, data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification ...

  6. A comprehensive survey of cryptography key management systems

    This paper will focus on the architectural aspects of KMS. The primary contributions of this research paper include: • Conduct a comprehensive literature survey of KMS systems. • Propose a novel taxonomy for the KMS methods. • Identify key requirements to envision KMS. • Explore research directions. The rest of the paper is organized as ...

  7. Double layer security using crypto-stego techniques: a ...

    Further, a detailed description of commonly using evaluations parameters for both steganography and cryptography, are given in this paper. Overall, this work is an attempt to create a better understanding of image steganography and its coupling with the encryption methods for developing state of art double layer security crypto-stego systems.

  8. An overview of visual cryptography techniques

    Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications.

  9. Cryptography: Recent research trends of encrypting mathematics

    Cryptography is the study of assured communication procedure which allows only the sender and the intended person to review the message and the content shared. The simplest method used is the symmetric algorithm in which once the message is encrypted it is sent to the recipient along with its secret key. 2.

  10. Cryptography

    A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the ...

  11. A Detailed Review Based on Secure Data Transmission Using Cryptography

    In this review paper, various cryptographic algorithms are compared with four types of cryptography methods, image data, video data, audio data and text data, for the secure transmission of data from one end to another end in the network. Cryptography has also provided reliable, robust networks strong and data security.

  12. PDF Post Quantum Cryptography: Techniques, Challenges, Standardization, and

    and provides future research directions in the eld of post-quantum cryptography. In 2018 Mavroeidis, et al. [4] published a paper to explain how quantum computing will a ect present-day cryptography. It mentioned 4 out of the 6 major post-quantum families and explained hash-based digital signatures in detail. This paper introduces and explains

  13. Cybersecurity, Cryptography, and Machine Learning

    Cryptography, an international, peer-reviewed Open Access journal. ... Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and ...

  14. A New Approach of Cryptography for Data Encryption and Decryption

    Cryptography is the solution to secure data from different security risks. To enhance the security of communication systems better cryptosystems technology is obvious in the area of cryptography. Our research focuses on data encryption and decryption technique for a better cryptosystem; where we have proposed a new approach that ensures better ...

  15. PDF Quantum Cryptography for Enhanced Network Security: A Comprehensive

    Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions Mst Shapna Akter∗ ∗Department of Computer Science, Kennesaw State University, USA {∗ [email protected]} Abstract—With the ever-growing concern for internet secu- rity, the field of quantum cryptography emerges as a promis-

  16. (PDF) Cryptography and Steganography: New Approach

    The aim of this paper is to develop a new approach to hiding a secret information in an image or audio or video, by taking advantage of benefits of combining cryptography and steganography. In ...

  17. Comparative Analysis of Cryptographic Key Management Systems

    Keywords: Cryptography, Key Distribution, Key Management Service, Secret Handling. 1 Introduction The complexity and reliability of any cryptosystem is based on the use of crypto-graphic keys. The key exchange is one of the mechanisms at core of the process and it ensure confidentiality when exchanging information between users and its behaviour is

  18. Cryptography Algorithms for Enhancing IoT Security

    This paper discusses lightweight block ciphers, stream ciphers, and hybrid ciphers. The report evaluates security algorithms, comparing performance and robustness with the computational complexity of these techniques. The following research question we address through our study is in line with the research objective. 1) What is the need for the ...

  19. Cryptography

    Cryptography, an international, peer-reviewed Open Access journal. Next Issue Volume 7, June. ... Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future ...

  20. A research Paper on Cryptography Encryption and Compression Techniques

    Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data.

  21. PDF The Usefulness Of Visual Cryptography Techniques: A ...

    comparison table are used to compare all the techniques to get the performance of all the techniques. We are discussing research papers related to visual cryptography usage on different platforms like visual cryptography in cloud computing, networks, online detection systems, and banking transaction systems.

  22. (PDF) An overview of visual cryptography techniques

    We conclude the paper with a discussion of these open problems and future research directions. General process of (k, n) visual cryptography. sual cryptography techniques covered in this paper.

  23. [2202.02826] Post Quantum Cryptography: Techniques, Challenges

    The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. The security of asymmetric algorithms like RSA, Diffie Hellman, and ECC is based ...

  24. (PDF) A Robust Approach to Secure Data Encryption: AES ...

    This approach adheres to the principle of least privil ege, limiting access to critical key materials. By. using kernel-based key storage, this research se eks to enhance the security of sensitive ...

  25. Machines

    A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the ...