A Cognitive Comparative Analysis of Geometric Shape-Based Cryptosystem

被引:0
|
作者
Kumar, K. R. Pruthvi [1 ]
Koundinya, Anjan K. [2 ]
Harsha, S. [3 ]
Nagaraja, G. S. [4 ]
Suvanam, Sasidhar Babu [5 ]
机构
[1] Visvesveraya Technol Univ, BMS Inst Technol & Management, Dept Comp Sci & Engn, Belagavi 590018, India
[2] Visvesveraya Technol Univ, BMS Inst Technol & Management, Dept Informat Sci & Engn Cyber Secur, Belagavi 590018, India
[3] Visvesveraya Technol Univ, RNS Inst Technol, Dept Artificial Intelligence & Machine Learning, Belagavi 590018, India
[4] Visvesveraya Technol Univ, Dept Comp Sci & Engn, RV Coll Engn, Belagavi 590018, India
[5] Presidency Univ, Dept Comp Sci & Engn, Bangalore, Karnataka, India
来源
FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 1, CIS 2023 | 2024年 / 868卷
关键词
Cryptography; Cryptosystem; Decryption; ElGamal; Encryption; Geometric shape; Hermitian curve; Ring; RSA; ENCRYPTION;
D O I
10.1007/978-981-99-9037-5_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cryptography is one of the most important and widely utilized applications in our daily lives, particularly in the protection of user data and information numerous organizations such as banks, government institutions, and communication companies require the use of a cryptosystem to safeguard their data during Internet transmissions and ensure secure transfer from the sender to the receiver. Cognitive cities are regularly automating the day-to-day urban processes and constantly expanding the objective-driven communities' collection to share the personal data that must be stored securely. The cloud provides a desirable platform for cognitive smart cities to access user data, enabling them to adapt their current actions and learn from past experiences. Various algorithms are used in cryptosystems to secure user data and information by encryption and decryption in all fields. Symmetric and asymmetric are the two types of cryptographic algorithms, which are used to secure user communication. Cryptography assists users in achieving data confidentiality, integrity, availability, authentication, and non-repudiation. In this paper, various methodologies like the ElGamal algorithm, RSA algorithm, Ring algorithm, and Hermitian curve algorithm are used for geometric shape cryptosystems to secure the data effectively. Cryptosystem algorithms enable high-security performance, effectiveness, high encryption effect, low time complexity, and low computation complexity, as demonstrated in this survey.
引用
收藏
页码:51 / 62
页数:12
相关论文
共 50 条
  • [1] EDGE-BASED AND SHAPE-BASED GEOMETRIC REGISTRATION
    HENDERSON, TC
    TRIENDL, EE
    WINTER, R
    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 1985, 23 (03): : 334 - 342
  • [2] Geometric constraint analysis and synthesis: Methods for improving shape-based registration accuracy
    Simon, DA
    Kanade, T
    CVRMED-MRCAS'97: FIRST JOINT CONFERENCE - COMPUTER VISION, VIRTUAL REALITY AND ROBOTICS IN MEDICINE AND MEDICAL ROBOTICS AND COMPUTER-ASSISTED SURGERY, 1997, 1205 : 181 - 190
  • [3] EDGE- AND SHAPE-BASED GEOMETRIC REGISTRATION.
    Henderson, Thomas C.
    Triendl, Ernst E.
    Winter, Rudolf
    1600, (GE-23):
  • [4] Shape-based functional data analysis
    Yuexuan Wu
    Chao Huang
    Anuj Srivastava
    TEST, 2024, 33 : 1 - 47
  • [5] Paradigm for shape-based image analysis
    Reinhardt, JM
    Higgins, WE
    OPTICAL ENGINEERING, 1998, 37 (02) : 570 - 581
  • [6] Shape-Based Analysis for Vessel Trajectories
    Wang, Jiang
    Zhou, Yun
    Cao, Xiaofeng
    Wang, Yilin
    Zhu, Cheng
    Zhang, Weiming
    25TH ACM SIGSPATIAL INTERNATIONAL CONFERENCE ON ADVANCES IN GEOGRAPHIC INFORMATION SYSTEMS (ACM SIGSPATIAL GIS 2017), 2017,
  • [7] Shape-based sequential machine analysis
    Crews, A
    Brewer, F
    ISCAS '99: PROCEEDINGS OF THE 1999 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 1: VLSI, 1999, : 395 - 399
  • [8] Tree shape-based approaches for the comparative study of cophylogeny
    Avino, Mariano
    Ng, Garway T.
    He, Yiying
    Renaud, Mathias S.
    Jones, Bradley R.
    Poon, Art F. Y.
    ECOLOGY AND EVOLUTION, 2019, 9 (12): : 6756 - 6771
  • [9] AUTOMATIC RECOGNITION AND REPRESENTATION OF SHAPE-BASED FEATURES IN A GEOMETRIC MODELING SYSTEM
    FALCIDIENO, B
    GIANNINI, F
    COMPUTER VISION GRAPHICS AND IMAGE PROCESSING, 1989, 48 (01): : 93 - 123
  • [10] Multilevel histogram shape-based image watermarking invariant to geometric attacks
    Feng, Bingwen
    Li, Guofeng
    Luo, Zhiquan
    Lu, Wei
    IET IMAGE PROCESSING, 2023, 17 (07) : 2097 - 2112