A Cognitive Comparative Analysis of Geometric Shape-Based Cryptosystem

被引:0
|
作者
Kumar, K. R. Pruthvi [1 ]
Koundinya, Anjan K. [2 ]
Harsha, S. [3 ]
Nagaraja, G. S. [4 ]
Suvanam, Sasidhar Babu [5 ]
机构
[1] Visvesveraya Technol Univ, BMS Inst Technol & Management, Dept Comp Sci & Engn, Belagavi 590018, India
[2] Visvesveraya Technol Univ, BMS Inst Technol & Management, Dept Informat Sci & Engn Cyber Secur, Belagavi 590018, India
[3] Visvesveraya Technol Univ, RNS Inst Technol, Dept Artificial Intelligence & Machine Learning, Belagavi 590018, India
[4] Visvesveraya Technol Univ, Dept Comp Sci & Engn, RV Coll Engn, Belagavi 590018, India
[5] Presidency Univ, Dept Comp Sci & Engn, Bangalore, Karnataka, India
来源
FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 1, CIS 2023 | 2024年 / 868卷
关键词
Cryptography; Cryptosystem; Decryption; ElGamal; Encryption; Geometric shape; Hermitian curve; Ring; RSA; ENCRYPTION;
D O I
10.1007/978-981-99-9037-5_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cryptography is one of the most important and widely utilized applications in our daily lives, particularly in the protection of user data and information numerous organizations such as banks, government institutions, and communication companies require the use of a cryptosystem to safeguard their data during Internet transmissions and ensure secure transfer from the sender to the receiver. Cognitive cities are regularly automating the day-to-day urban processes and constantly expanding the objective-driven communities' collection to share the personal data that must be stored securely. The cloud provides a desirable platform for cognitive smart cities to access user data, enabling them to adapt their current actions and learn from past experiences. Various algorithms are used in cryptosystems to secure user data and information by encryption and decryption in all fields. Symmetric and asymmetric are the two types of cryptographic algorithms, which are used to secure user communication. Cryptography assists users in achieving data confidentiality, integrity, availability, authentication, and non-repudiation. In this paper, various methodologies like the ElGamal algorithm, RSA algorithm, Ring algorithm, and Hermitian curve algorithm are used for geometric shape cryptosystems to secure the data effectively. Cryptosystem algorithms enable high-security performance, effectiveness, high encryption effect, low time complexity, and low computation complexity, as demonstrated in this survey.
引用
收藏
页码:51 / 62
页数:12
相关论文
共 50 条
  • [21] QUANTITATIVE-ANALYSIS OF AGGREGATE SHAPE-BASED ON FRACTALS
    LI, L
    CHAN, P
    ZOLLINGER, DG
    LYTTON, RL
    ACI MATERIALS JOURNAL, 1993, 90 (04) : 357 - 365
  • [22] Shape-based image retrieval
    Choras, Ryszard S.
    NEW ASPECTS OF SIGNAL PROCESSING AND WAVELETS, 2008, : 99 - 104
  • [23] Shape-based word recognition
    Document Recognition Technologies, Inc., 459 Hamilton Avenue, Suite 204, Palo Alto, CA 94301, United States
    Int. J. Doc. Anal. Recogn., 4 (178-190):
  • [24] Shape-Based Compliance in Locomotion
    Travers, Matt
    Whitman, Julian
    Schiebel, Perrin
    Goldman, Dan
    Choset, Howie
    ROBOTICS: SCIENCE AND SYSTEMS XII, 2016,
  • [25] Geodesic Shape-Based Averaging
    Cardoso, M. Jorge
    Winston, Gavin
    Modat, Marc
    Keihaninejad, Shiva
    Duncan, John
    Ourselin, Sebastien
    MEDICAL IMAGE COMPUTING AND COMPUTER-ASSISTED INTERVENTION - MICCAI 2012, PT III, 2012, 7512 : 26 - 33
  • [26] Shape-based pedestrian detection
    Broggi, A
    Bertozzi, M
    Fascioli, A
    Sechi, M
    PROCEEDINGS OF THE IEEE INTELLIGENT VEHICLES SYMPOSIUM 2000, 2000, : 215 - 220
  • [27] Shape-based Trajectory Clustering
    Pires, Telmo J. P.
    Figueiredo, Mario A. T.
    ICPRAM: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION APPLICATIONS AND METHODS, 2017, : 71 - 81
  • [28] Shape-based Pedestrian Parsing
    Bo, Yihang
    Fowlkes, Charless C.
    2011 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2011,
  • [29] A shape-based buffering method
    Mu, Lan
    ENVIRONMENT AND PLANNING B-PLANNING & DESIGN, 2008, 35 (03): : 399 - 412
  • [30] Shape-Based Mutual Segmentation
    Tammy Riklin-Raviv
    Nir Sochen
    Nahum Kiryati
    International Journal of Computer Vision, 2008, 79 : 231 - 245