A Cognitive Comparative Analysis of Geometric Shape-Based Cryptosystem

被引:0
|
作者
Kumar, K. R. Pruthvi [1 ]
Koundinya, Anjan K. [2 ]
Harsha, S. [3 ]
Nagaraja, G. S. [4 ]
Suvanam, Sasidhar Babu [5 ]
机构
[1] Visvesveraya Technol Univ, BMS Inst Technol & Management, Dept Comp Sci & Engn, Belagavi 590018, India
[2] Visvesveraya Technol Univ, BMS Inst Technol & Management, Dept Informat Sci & Engn Cyber Secur, Belagavi 590018, India
[3] Visvesveraya Technol Univ, RNS Inst Technol, Dept Artificial Intelligence & Machine Learning, Belagavi 590018, India
[4] Visvesveraya Technol Univ, Dept Comp Sci & Engn, RV Coll Engn, Belagavi 590018, India
[5] Presidency Univ, Dept Comp Sci & Engn, Bangalore, Karnataka, India
来源
FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 1, CIS 2023 | 2024年 / 868卷
关键词
Cryptography; Cryptosystem; Decryption; ElGamal; Encryption; Geometric shape; Hermitian curve; Ring; RSA; ENCRYPTION;
D O I
10.1007/978-981-99-9037-5_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cryptography is one of the most important and widely utilized applications in our daily lives, particularly in the protection of user data and information numerous organizations such as banks, government institutions, and communication companies require the use of a cryptosystem to safeguard their data during Internet transmissions and ensure secure transfer from the sender to the receiver. Cognitive cities are regularly automating the day-to-day urban processes and constantly expanding the objective-driven communities' collection to share the personal data that must be stored securely. The cloud provides a desirable platform for cognitive smart cities to access user data, enabling them to adapt their current actions and learn from past experiences. Various algorithms are used in cryptosystems to secure user data and information by encryption and decryption in all fields. Symmetric and asymmetric are the two types of cryptographic algorithms, which are used to secure user communication. Cryptography assists users in achieving data confidentiality, integrity, availability, authentication, and non-repudiation. In this paper, various methodologies like the ElGamal algorithm, RSA algorithm, Ring algorithm, and Hermitian curve algorithm are used for geometric shape cryptosystems to secure the data effectively. Cryptosystem algorithms enable high-security performance, effectiveness, high encryption effect, low time complexity, and low computation complexity, as demonstrated in this survey.
引用
收藏
页码:51 / 62
页数:12
相关论文
共 50 条
  • [41] Shape-based retrieval and analysis of 3D models
    Funkhouser, T
    Kazhdan, M
    Min, P
    Shilane, P
    COMMUNICATIONS OF THE ACM, 2005, 48 (06) : 58 - 64
  • [42] Shape-based visual analysis of solutions for Multiobjective Optimization problems
    von Luecken, Christian
    Fretes Prieto, Abrahan D.
    Ferreira Vera y Aragon, Arsenio M.
    Baran, Benjamin
    2017 XLIII LATIN AMERICAN COMPUTER CONFERENCE (CLEI), 2017,
  • [43] Shape-based Data Analysis for Event Classification in Power Systems
    Cordova, Jose
    Arghandeh, Reza
    Zhou, Yuxun
    Wesolowski, Sergiusz
    Wu, Wei
    Matthias, Stifter
    2017 IEEE MANCHESTER POWERTECH, 2017,
  • [44] SHAPE-BASED TIME SERIES ANALYSIS FOR REMOTE PHENOLOGY STUDIES
    Torres, Ricardo da S.
    Hasegawa, Makoto
    Tabbone, Salvatore
    Almeida, Jurandy
    dos Santos, Jefersson A.
    Alberton, Bruna
    Morellato, Leonor Patricia C.
    2013 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS), 2013, : 3598 - 3601
  • [45] Shape-based normalization of the corpus callosum for DTI connectivity analysis
    Sun, Hui
    Yushkevich, Paul A.
    Zhang, Hui
    Cook, Philip A.
    Duda, Jeffrey T.
    Simon, Tony J.
    Gee, James C.
    IEEE TRANSACTIONS ON MEDICAL IMAGING, 2007, 26 (09) : 1166 - 1178
  • [46] Evaluation of shape descriptors for shape-based image retrieval
    Amanatiadis, A.
    Kaburlasos, V. G.
    Gasteratos, A.
    Papadakis, S. E.
    IET IMAGE PROCESSING, 2011, 5 (05) : 493 - 499
  • [47] Shape-based separation of synthetic microparticles
    Peter L. Mage
    Andrew T. Csordas
    Tyler Brown
    Daniel Klinger
    Michael Eisenstein
    Samir Mitragotri
    Craig Hawker
    H. Tom Soh
    Nature Materials, 2019, 18 : 82 - 89
  • [48] SHAPE-BASED ADULT IMAGE DETECTION
    Zheng, Qing-Fang
    Zeng, Wei
    Wang, Wei-Qiang
    Gao, Wen
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2006, 6 (01) : 115 - 124
  • [49] Shape-based coordination in locomotion control
    Travers, Matthew
    Whitman, Julian
    Choset, Howie
    INTERNATIONAL JOURNAL OF ROBOTICS RESEARCH, 2018, 37 (10): : 1253 - 1268
  • [50] Shape-based recognition of wiry objects
    Carmichael, O
    Hebert, M
    2003 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL II, PROCEEDINGS, 2003, : 401 - 408