Nanotechnology and cryptographic protocols: issues and possible solutions

被引:0
|
作者
Shukla, Varun [1 ]
Chaturvedi, Atul [2 ]
Srivastava, Neelam [3 ]
机构
[1] Pranveer Singh Inst Technol, Dept Elect & Commun, Kanpur, Uttar Pradesh, India
[2] Pranveer Singh Inst Technol, Dept Math, Kanpur, Uttar Pradesh, India
[3] Rajkiya Engn Coll, Kannauj, India
关键词
mathematical methods; nanotechnology; nanotubes; SECURE; PERFORMANCE;
D O I
10.1680/jnaen.18.00006
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Nanotechnology has provided an immense increment in computational power. This high computational strength is very dangerous for existing cryptographic protocols, and the Data Encryption Standard algorithm is a classic example of that. Thus, it is an urgent requirement that new protocols or mathematical methods be developed for data security that can remain secure from fast modern computers powered by nanotechnology. The authors consider the example of military communication, as data communication security in military communication is a matter of national security. The authors present a new method for message exchange for military communication that has never been presented until now. This novelty creates a hard task for intruders, and the authors use steganography as a supporting tool for cryptography. The security of encrypted data increases when the data are hidden in a carrier file. Nobody knows (except the sender and the intended receiver) that there are some hidden data. The authors compare different algorithms for size restrictions because size is an important factor for steganograms and that is the only chance of guessing that the open file contains something suspicious (hidden encrypted data).
引用
收藏
页码:78 / 83
页数:6
相关论文
共 50 条
  • [1] Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
    Ayday, Erman
    Tang, Qiang
    Yilmaz, Arif
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 33 - 43
  • [2] Survey on VANET security challenges and possible cryptographic solutions
    Mejri, Mohamed Nidhal
    Ben-Othman, Jalel
    Hamdi, Mohamed
    VEHICULAR COMMUNICATIONS, 2014, 1 (02) : 53 - 66
  • [3] Stateless Cryptographic Protocols
    Goyal, Vipul
    Maji, Hemanta K.
    2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 678 - 687
  • [4] Cryptography and cryptographic protocols
    Goldreich, O
    DISTRIBUTED COMPUTING, 2003, 16 (2-3) : 177 - 199
  • [5] Programming cryptographic protocols
    Guttman, JD
    Herzog, JC
    Ramsdell, JD
    Sniffen, BT
    TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 116 - 145
  • [6] Cryptography and cryptographic protocols
    Oded Goldreich
    Distributed Computing, 2003, 16 : 177 - 199
  • [7] Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols
    Mayouf, Mabroka Ali
    Shukur, Zarina
    VISUAL INFORMATICS: BRIDGING RESEARCH AND PRACTICE, 2009, 5857 : 510 - 520
  • [8] Sequential rationality in cryptographic protocols
    Gradwohl, Ronen
    Livne, Noam
    Rosen, Alon
    ACM Transactions on Economics and Computation, 2013, 1 (01)
  • [9] Special Issue on Cryptographic Protocols
    Vogt, Andreas
    CRYPTOGRAPHY, 2018, 2 (03)
  • [10] A bisimulation method for cryptographic protocols
    Abadi, M
    Gordon, AD
    PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 12 - 26