Open Access is an initiative that aims to make scientific research freely available to all. To date our community has made over 100 million downloads. It’s based on principles of collaboration, unobstructed discovery, and, most importantly, scientific progression. As PhD students, we found it difficult to access the research we needed, so we decided to create a new Open Access publisher that levels the playing field for scientists across the world. How? By making research easy to access, and puts the academic needs of the researchers before the business interests of publishers.

We are a community of more than 103,000 authors and editors from 3,291 institutions spanning 160 countries, including Nobel Prize winners and some of the world’s most-cited researchers. Publishing on IntechOpen allows authors to earn citations and find new collaborators, meaning more people see your work not only from your own field of study, but from other related fields too.

Brief introduction to this section that descibes Open Access especially from an IntechOpen perspective

Want to get in touch? Contact our London head office or media team here

Our team is growing all the time, so we’re always on the lookout for smart people who want to help us reshape the world of scientific publishing.

Home > Books > Biometrics and Cryptography [Working Title]

Cryptography: Recent Advances and Research Perspectives

Submitted: 06 May 2023 Reviewed: 15 May 2023 Published: 27 December 2023

DOI: 10.5772/intechopen.111847

Cite this chapter

There are two ways to cite this chapter:

From the Edited Volume

Biometrics and Cryptography [Working Title]

Dr. Sudhakar Radhakrishnan

Chapter metrics overview

63 Chapter Downloads

Impact of this chapter

Total Chapter Downloads on intechopen.com

Cryptography is considered as a branch of both mathematics and computer science, and it is related closely to information security. This chapter explores the earliest known cryptographic methods, including the scytale, Caesar cipher, substitution ciphers, and transposition ciphers. Also, explains the evolution of these methods over time. The development of symmetric and asymmetric key cryptography, hash functions, and digital signatures is also discussed. The chapter highlights major historical events and technological advancements that have driven the need for stronger and more efficient encryption methods. In addition, the chapter explores the potential for integrating artificial intelligence tools with cryptographic algorithms and the future of encryption technology.

  • cryptography
  • mathematics
  • computer science
  • information security
  • Caesar cipher
  • substitution ciphers
  • transposition ciphers
  • symmetric key cryptography
  • asymmetric key cryptography
  • hash functions
  • digital signatures
  • historical events
  • technological advancements
  • artificial intelligence

Author Information

Monther tarawneh *.

  • Computer Science Department, Isra University, Amman, Jordan

*Address all correspondence to: [email protected]

1. Introduction

Cryptography is the science converting information into an unreadable format as a practice of protecting confidential messages from unauthorized access [ 1 ]. Cryptographic algorithms have come a long way since the early days of cryptography and have evolved to keep up with the changing technological landscape. In this chapter, we will explore the history of cryptographic algorithms and their evolution over time.

The earliest known cryptographic methods date back to ancient civilizations, where methods, such as simple substitution and transposition ciphers, were used to conceal messages and prevent non-authorized people from understanding messages. These methods evolved over time to include more complex ciphers, such as the Caesar cipher and the Vigenère cipher, which were used during the Middle Ages. The development of the printing press and the subsequent increase in literacy rates led to the need for more secure methods of encryption, which led to the development of more complex ciphers such as the Playfair cipher and the Enigma machine.

Symmetric key cryptography is one of the oldest and most widely used types of encryption. It is based on the concept of using the same key to encrypt and decrypt a message. The history of symmetric key algorithms dates back to ancient times, where simple substitution ciphers were used to encrypt messages. Over time, more complex algorithms were developed such as the Hill cipher and the data encryption standard (DES). The development of the advanced encryption standard (AES) in the late twentieth century marked a significant improvement in symmetric key cryptography as it provided stronger encryption and faster processing times.

Asymmetric key cryptography, also known as public-key cryptography, is a more recent development in the field of cryptography. It is based on the use of two different keys—a public key and a private key—to encrypt and decrypt messages. The concept of asymmetric key cryptography was first introduced by Whitfield Diffie and Martin Hellman in 1976 [ 2 ]. This led to the development of various algorithms such as the Rivest-Shamir-Adleman (RSA) algorithm [ 3 ] and the Diffie-Hellman key exchange [ 4 ].

Hash functions are another important component of modern-day encryption. A hash function is a mathematical function that takes an input (or message) and produces a fixed-length output (or hash) [ 5 ]. Hash functions are used to ensure the integrity of data as any change to the original input will result in a different hash. The history of hash functions dates back to the 1950s, where the concept of message digests was introduced. Over time, more complex algorithms were developed such as the secure hash algorithm (SHA) and the message digest (MD) [ 5 , 6 ].

Digital signatures are used to provide authentication and non-repudiation in digital communications. A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. The history of digital signature algorithms dates back to the early 1980s, where the concept of public-key cryptography was first introduced. Over time, various algorithms were developed such as the digital signature algorithm (DSA) and the elliptic curve digital signature algorithm (ECDSA) [ 7 ].

The evolution of cryptographic algorithms has been driven by major historical events and technological advancements. With the advent of the internet and the increase in digital communication, the need for stronger and more efficient encryption methods became more pressing. As computing power continues to increase, the potential for cracking encryption algorithms also increases. This has led to the need for stronger and more advanced cryptographic algorithms, such as post-quantum cryptography, which can withstand attacks from quantum computers.

In addition to the potential threats to encryption technology, there is also the potential for integrating artificial intelligence tools with cryptographic algorithms. For example, machine learning algorithms could be used to identify potential vulnerabilities in encryption systems and improve their security.

As the digital landscape continues to evolve, the importance of staying ahead of the curve in encryption technology cannot be overstated. This chapter provides an overview of the history and evolution of cryptographic algorithms, highlighting the need for ongoing innovation and development in this field. By continuing to push the boundaries of encryption technology, we can help to safeguard the privacy and security of sensitive data in the digital age.

Encryption is a critical component of modern communication and information security [ 8 ]. By converting data into a secure format that can only be accessed with the correct key or password, encryption ensures that sensitive information is protected from unauthorized access. Throughout history, cryptography has played a significant role in the security of sensitive information from the early substitution ciphers used by ancient civilizations to the modern public-key encryption algorithms.

Recent developments in technology have led to new challenges and opportunities in the field of cryptography. The rise of quantum computing [ 9 ], blockchain technology [ 10 ], and the need for secure communication in an increasingly connected world have all driven new research and innovation in the field of cryptography [ 11 ].

This chapter provides an overview of various cryptographic techniques, including symmetric and asymmetric encryption, hashing, digital signatures, homomorphic encryption, multiparty computation, and lightweight cryptography. Each of these techniques has its own strengths and weaknesses and is suited to different use cases and scenarios. The chapter also explores the future of cryptography, including developments in post-quantum cryptography, blockchain-based cryptography, and other emerging technologies. By understanding the principles and applications of modern cryptography, we can better protect our digital assets and maintain the privacy and security of our communication.

2. Ancient cryptography methods

The history of cryptography dates back to ancient civilizations, where people used various methods to protect their messages from unauthorized access. The earliest examples of cryptography being used to protect information were found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in Egypt [ 12 , 13 ]. The inscription, known as the “Cryptography Inscription,” described a method for hiding the meaning of hieroglyphic inscriptions by using symbols to represent individual letters. The symbols were then scrambled in a specific way to make the text difficult to read. The main purpose of the “Cryptography Inscription” was not to hide the message but rather to change its form in a way that would make it appear dignified. While the symbols used in the inscription were scrambled, they were still readable by those who were familiar with the method of substitution used. It means that the inscription was intended for a specific audience who were already familiar with the method rather than as a means of keeping the message secret from all who might view it.

2.1 Substitution cipher

Monoalphabetic substitution: a basic cryptography method where each character of the plaintext is replaced with a corresponding character of cipher text. The same substitute symbol or letter is used every time a particular plaintext letter appears. For example, if “A” is substituted with “D,” every “A” in the plaintext will be replaced with “D” in the cipher text as shown in Figure 1 . This makes it vulnerable to frequency analysis attacks as the frequency of each letter in the cipher text will correspond to the frequency of the original letters in the plaintext. Therefore, it is considered a weak encryption method and is no longer used for serious cryptographic applications. However, it can still be used as a simple way to obscure text such as in puzzles or games.

One of the earliest examples of a monoalphabetic substitution cipher is the Caesar cipher, which was used by Julius Caesar to communicate secretly with his generals. In this cipher, each letter in the plaintext is shifted a certain number of places down the alphabet. For example, if the shift value is three, then the letter A is replaced by D, B is replaced by E, and so on shown in Figure 2 . The recipient of the message would need to know the shift value to decrypt the message.

Another example of a monoalphabetic substitution cipher is the simple substitution cipher in which each plaintext letter is replaced by a corresponding symbol or letter from a fixed substitution pattern. Unlike the Caesar cipher, the substitution pattern for the simple substitution cipher is not based on a fixed shift value. Instead, the substitution pattern is usually chosen randomly or based on a key provided to the recipient.

Despite being simple to implement, monoalphabetic substitution ciphers are not secure by today’s standards as it makes it easier for an attacker to crack the code.

Polyalphabetic substitution: It is made up of multiple monoalphabetic substitutions. In this method, a series of monoalphabetic substitutions are performed on the plaintext, using different substitution alphabets for each letter of the plaintext. This helps to make the ciphertext more difficult to crack as the same plaintext letter can be encrypted in different ways depending on its position in the message.

Vigenère cipher is the most known polyalphabetic substitution, which was invented in the sixteenth century and used by the French military for several centuries [ 14 ]. The Vigenère cipher uses a series of different alphabets, each generated by shifting the previous alphabet by one letter. The cipher is implemented using the Vigenère square (or table), which is made up of twenty-six distinct cipher alphabets as shown in Figure 3 . In the header row, the alphabet is written in its normal order. In each subsequent row, the alphabet is shifted one letter to the right until a 26 × 26 block of letters is formed.

research article about cryptography

Monoalphabetic substitution cryptography.

research article about cryptography

Caesar cipher with 1, 2, 3, and 4 shit to the left.

research article about cryptography

Vigenère square.

Vigenère cipher can be done using the simplest way, which is similar to Caeser cipher or sophisticated way, where keyword is used for the encryption to specify the letter, the keyword is repeated over the length of the plaintext, and each letter of the keyword is used to shift the corresponding letter of the plaintext by a certain number of positions in the alphabet. For example, if you encrypt “security” using the simple way, it will be “TGFYWOAG.” But when using the sophisticated way with “IBRI” as a keyword, the cipher text will be “AFTCZJKG.” To make the cipher more secure, Vigenère suggested using a different keyword for each message rather than reusing the same keyword over and over again. He also suggested using longer keywords to make the cipher even harder to crack. However, if the length of the keyword is known, it can be easily broken using frequency analysis [ 15 ]. Figure 4 shows an example of onetime pad encryption/decryption.

research article about cryptography

onetime-pad encryption/decryption example.

The onetime pad cipher is not a type of Vigenère cipher. It is a completely different encryption method that is based on using a long, randomly generated key that is at least as long as the plaintext. The key is made up of a series of random symbols, and each symbol is used only once to encrypt one character of the plaintext. Because the key is truly random and used only once, the onetime pad cipher is considered unbreakable, provided that the key is kept secret and destroyed after use by both the sender and the receiver.

The key must be as long as the plaintext for the onetime pad to be unbreakable. Because onetime pad is based on perfect secrecy, which means that the ciphertext provides no information about the plaintext, even if the attacker has unlimited computational power.

Generating truly random keys that are as long as the plaintext is a challenging task, and transmitting them securely to the recipient is also a difficult problem. This is why the onetime pad is mostly used in special cases such as diplomatic and intelligence traffic. Also, onetime pad only guarantees confidentiality and not integrity. This means that an attacker who intercepts the ciphertext can not recover the plaintext, but they can easily modify the ciphertext to change the meaning of the message. Onetime pad requires a unique key for every message, and the keys should be securely destroyed after use to prevent reuse.

The Playfair cipher is a polygraphic substitution cipher invented in 1854 by Sir Charles Wheatstone [ 16 ]. It was the first cipher that allowed for the encryption of pairs of letters instead of single letters. The Playfair cipher uses a 5 × 5 grid of letters, with each letter of the alphabet appearing once. The letters in the grid are usually chosen using a keyword. The keyword is then written into the grid, and the remaining spaces are filled with the letters of the alphabet in order.

5 × 5 table

Skip letter J

Keyword has no repeating letter

fill in the remaining letters in alphabetic order (skip letter J)

Message must be split into pairs

Repeating plaintext letters that are in the same pair are separated with X

If there is an odd letter at the end of the message insert the letter X

Move each letter down one position

Upon reaching end of table, wrap around

Move each letter right one position

Swap the letters with the ones on the end of the rectangle

research article about cryptography

Playfair cipher steps (A: simple and B: Sophisticated).

An electromechanical machine developed in 2017 [ 17 ] that used a rotating disc with an embedded key to encode a substitution table that changed with every new character typed. This device was the first example of a rotor machine. The following year, a German engineer, invented the Enigma machine [ 18 ], which used multiple rotors instead of one. Initially designed for commercial use, the German military soon recognized the potential of the Enigma machine and began using it to send coded transmissions.

2.2 Transposition cipher

Transposition cipher is an earlier method, where the letters of the message are rearranged according to a certain pattern, but the letters themselves are not changed as shown in Figure 6 . Unlike substitution ciphers, which replace plaintext characters with different symbols or letters, transposition ciphers do not change the characters themselves. Instead, they simply reorder the characters to create a new message. The security of a transposition cipher is based on the difficulty of reconstructing the original message from the reordered characters without knowledge of the used transposition algorithm.

research article about cryptography

Transposition cipher example.

The Rail Fence cipher is a type of transposition cipher that was first used during the American Civil War. The technique involves writing the plaintext diagonally on a grid, then reading the letters in a zigzag pattern along the rows of the grid to produce the ciphertext. The number of rows in the grid can be adjusted to increase the complexity of the cipher.

For example, suppose we want to encrypt the message “HELLO WORLD” using a Rail Fence cipher with three rows. Write the letters on a grid as shown in Figure 7 .

research article about cryptography

Rail Fence encryption example.

To decrypt the message, we would write the ciphertext diagonally on a grid, then read the letters in the same zigzag pattern along the rows of the grid to recover the plaintext.

While these ancient methods of cryptography may seem primitive by today’s standards, they laid the foundation for the development of more complex encryption techniques in the future. The principles of substitution and transposition ciphers are still used in modern cryptography, and the need for secure communication continues to drive the evolution of cryptographic algorithms.

3. Symmetric key cryptography

Symmetric key cryptography schemes are categorized as stream ciphers or block ciphers. Stream ciphers work on a single bit at a time and execute some form of feedback structure so that the key is repeatedly changing. A block cipher encrypts one block at a time utilizing the same key on each block. In general, the same plaintext block will continually encrypt to the same ciphertext when using the similar key in a block cipher, whereas the same plaintext will encrypt to different ciphertext.

The history of symmetric key cryptography can be traced back to the days of Julius Caesar, who used a simple substitution cipher to protect his military communications. Over time, various types of symmetric key encryption algorithms were developed, such as the Vigenère cipher, which used a polyalphabetic substitution method, and the Enigma machine, which used a combination of substitution and transposition methods.

3.1 Data encryption standard (DES)

Initial permutation (IP): The 64-bit input plaintext is shuffled (rearranged) according to a fixed permutation table to produce the permuted input. The initial permutation and its inverse are defined by tables that indicate the position of each bit in the input to the output as shown in Figure 8 . The permutation tables are used in the encryption and decryption processes to rearrange the bits of the input according to the specified permutation.

Separation: The left and right halves of each 64-bit intermediate value are treated as separate 32-bit quantities, labeled L (left) and R (right).

Expansion: The input key for each round is 48 bits and the right side (R) is 32 bits. In order to XOR Ki with Ri, we need to expand the length of Ri to 48 bits. The expansion table in Figure 10 is used for this purpose.

The 64-bit key is permuted using a fixed permutation called the permutation choice 1 (PC-1) as shown in Figure 11 . The output of this step is a 56-bit key, where eight of the bits are parity bits and are not used in the encryption process.

The 56-bit key is then split into two 28-bit halves, C0 and D0.

Each of the halves is subjected to a series of circular shifts or rotations. In particular, for rounds 1, 2, 9, and 16, the shifts are one bit, while for all other rounds, the shifts are two bits.

After each shift, the two halves are combined to form a 56-bit value, which is then permuted using a fixed permutation called the permutation choice 2 (PC-2) as shown in Figure 9 . The output of this step is a 48-bit subkey.

This process is repeated for each round of the encryption process, resulting in a total of 16 subkeys.

The subkeys are used in the encryption process as inputs to the round function, which combines them with the plaintext to produce the ciphertext.

Substitution: This 48-bit result passes through a substitution function that produces a 32-bit output. The S-boxes, also known as substitution boxes, are the only nonlinear elements in the DES design. The S-boxes are used to introduce confusion in the ciphertext by replacing each block of 6 bits of the input with a different 4-bit output. There are 8S-boxes in DES as shown in Figure 12 , each taking a 6-bit input and producing a 4-bit output. Each row of an S-box defines a substitution for a specific 4-bit input value, while the column of the S-box defines the output value for that input value based on the remaining 2 bits of the input. This allows for a total of 16 x 4 = 64 possible substitutions in each S-box.

Permutation: The 32-bit outputs from the S-boxes are then concatenated and subjected to a fixed permutation using the P-box permutation.

Final permutation (IP-1): The pre-output is shuffled according to another fixed permutation table, which is the inverse of the initial permutation, to produce the 64-bit cipher text. The figure shows the internal structure of a single round.

research article about cryptography

The initial permutation and its inverse.

research article about cryptography

Internal structure of single round.

research article about cryptography

Expansion permutation table.

research article about cryptography

Tables used in subkeys generation.

research article about cryptography

S-boxes used in the substitution step in DES.

The main steps summarized in Figure 13 . The DES key generates 48 bits long 16 round keys from the initial 56 bit key. These keys are used in each round of the encryption process to modify the plaintext. The key involves applying a series of operations, including a permutation, a compression function, and left shifts, to the 56-bit key. The resulting subkeys are used one at a time in each round of the encryption process.

research article about cryptography

DES Algorithm steps.

However, due to its small key size, DES is now considered insecure [ 19 ] and has been replaced by the advanced encryption s (AES).

The plaintext is encrypted using the first 56-bit key (K1) with the DES algorithm to produce a ciphertext.

The ciphertext from step 1 is decrypted using the second 56-bit key (K2) with the DES algorithm to produce an intermediate value.

The intermediate value from step 2 is encrypted again using the third 56-bit key (K3) with the DES algorithm to produce the final ciphertext.

Thus, 3DES involves encrypting the plaintext with K1, decrypting the result with K2, and encrypting again with K3. The three keys K1, K2, and K3 are usually independent keys generated randomly, although some variants of 3DES use a “keying option” that allows for fewer keys to be used while still maintaining a higher level of security.

While 3DES is slower than DES due to its triple encryption process, it is still considered a relatively fast algorithm and can be implemented in hardware, as well as software. Also, due to its small key size, DES is now considered insecure [ 19 ] and has been replaced by the advanced encryption standard (AES).

3.2 Advanced encryption standard (AES)

The AES (Advanced Encryption Standard) is a symmetric block cipher that operates on fixed-size 128-bit blocks and supports key sizes of 128, 192, and 256 bits. It was standardized by NIST (National Institute of Standards and Technology) in 2001 as a replacement for the aging DES (Data Encryption Standard) cipher.

The AES was selected from a pool of 15 candidate algorithms that were submitted in response to a call for proposals issued by NIST in 1997 [ 21 ]. The selection process involved several rounds of analysis and testing, culminating in the selection of Rijndael [ 22 ], a cipher developed by Belgian cryptographers Joan Daemen and Vincent Rijmen, as the winner.

The AES encryption and decryption algorithms use a series of rounds, where all operations are performed on 8-bit bytes (one Word) ( Figure 14 ). Each round of processing works on the input state array and produces an output state array. The output state array produced by the last round is rearranged into a 128-bit output block. The state array is a 4 × 4 matrix of bytes that represents the input block. Each round, the state array is modified by a series of operations that include byte substitution, permutation, and arithmetic operations over a finite field as shown in the figure below. After the final round, the state array contains the encrypted or decrypted data, which are then copied to an output matrix to produce the final ciphertext or plaintext block.

research article about cryptography

The structure of AES algorithm.

SubBytes : The substitute bytes stage of AES uses a fixed S-box, which is a 256-byte lookup table, to perform a byte-by-byte substitution of the input block. The S-box is designed so that each input byte is replaced by a unique output byte. The inverse S-box is used in the decryption process, which maps each output byte back to its original input byte. The S-box is a nonlinear component of the AES algorithm, which helps to increase the resistance of the cipher to various attacks. For example, 19 will be mapped to the value crossed between row 1 and column 9, which is equal to D4 in the S-Box as shown in Figure 15 .

ShiftRows : The shiftRows stage is a permutation step that cyclically shifts the bytes in each row of the state array by a certain number of bytes. This operation is applied to each row independently, with no mixing of the bytes between the rows. The number of bytes shifted is determined by the row number: the first row is not shifted at all, the second row is shifted by one byte to the left, the third row is shifted by two bytes to the left, and the fourth row is shifted by three bytes to the left as shown in Figure 16 .

This operation provides diffusion of the input data, which increases the security of the cipher. The inverse operation, used for decryption, is a cyclic shift to the right instead of the left so that the original byte positions are restored.

MixColumns : each column of the state array is treated as a polynomial over the finite field GF(2^8), where each byte is a coefficient of the polynomial. The bytes are then multiplied by a fixed polynomial, and the result is reduced modulo another fixed polynomial. This transformation ensures that each byte in a column is dependent on all four bytes in the same column as demonstrated in Figure 17 .

The multiplication and reduction are done using a pre-computed table of values. The table is constructed in such a way that multiplication is reduced to a simple table lookup and XOR operation.

During decryption, the inverse operation of MixColumns is performed. This involves multiplying each column by a different fixed polynomial and reducing the result modulo another fixed polynomial.

AddRoundkey : Each byte of the current block is XORed with the corresponding byte of the round key. The round key is derived from the main encryption key using a key schedule algorithm, which generates a set of round keys for each round of encryption. This stage serves to add a layer of confusion to the encryption process, making it more difficult to analyze and break the cipher. Figure 18 describe the AddRoundkey process in AES.

research article about cryptography

S-Box used in AES.

research article about cryptography

ShiftRows operation and its output (with example).

research article about cryptography

Mix column function.

research article about cryptography

Description of the AddRoundkey in AES.

The AES key expansion algorithm takes as input a 128-bit (16-byte) key and generates a sequence of round keys, one for each round of the AES encryption process. The key expansion algorithm uses a key schedule to generate these round keys, which involves performing a series of operations on the input key to generate an expanded key.

The key schedule begins by copying the input key into the first four words of the key schedule. Then, the key expansion algorithm applies a series of operations to the last four words of the current key schedule to generate the next four words. This process is repeated until the key schedule contains the necessary number of round keys for the specified key size. For example, for a 128-bit key, the key schedule will generate 11 round keys, one for each of the 10 rounds of AES encryption plus an initial round key. For a 192-bit key, the key schedule will generate 13 round keys, and for a 256-bit key, the key schedule will generate 15 round keys.

RotWord performs a one-byte circular left shift on a word.

SubWord performs a byte substitution on each byte of its input word, using the S-box.

The result of steps 1 and 2 is XORed with a round constant, Rcon[j].

research article about cryptography

The values of Rcon[j] in hexadecimal.

The AES cipher is widely used in various applications, including secure communications, data storage, and authentication. Its security has been extensively analyzed, and it is considered to be highly secure against various types of attacks.

3.3 More symmetric algorithms

Blowfish [ 23 ]: A symmetric key block cipher that uses variable-length keys (up to 448 bits) and a block size of 64 bits. Blowfish is widely used in cryptographic applications and is known for its fast encryption and decryption speed.

Twofish [ 24 ]: A symmetric key block cipher that is a successor to Blowfish. It uses a block size of 128 bits and supports key sizes up to 256 bits. Twofish is considered a strong and secure encryption algorithm but is slower than some other algorithms.

Rivest Cipher 4 (RC4) [ 25 ]: A symmetric key stream cipher that is widely used in wireless networks, secure socket layer (SSL), and other applications. RC4 uses a variable-length key (up to 2048 bits) to generate a stream of pseudo-random bytes, which are XORed with the plaintext to produce the ciphertext. However, RC4 has been found to be vulnerable to attacks and is now considered insecure for many applications.

3.4 Mode of operation

Since block ciphers operate on fixed-size blocks of data, they cannot be directly used to encrypt or decrypt messages that are larger than the block size. A mode of operation is a technique used to apply a block cipher to encrypt or decrypt data that is larger than the block size of the cipher.

Modes of operation are used to overcome this limitation by allowing the encryption or decryption of data that is larger than the block size of the cipher. These modes provide methods to break up the input message into blocks, and then apply the block cipher to each block. This process is typically performed using feedback mechanisms that generate input for each subsequent block, based on the output of the previous block.

Electronic codebook (ECB): This is the simplest mode of operation, where each block of plaintext is encrypted independently with the same key as shown in Figure 20 . However, it is not suitable for encrypting large amounts of data or data with a predictable structure. It suffers from the lack of diffusion, which means that identical plaintext blocks will result in identical ciphertext blocks. This makes it vulnerable to attacks as patterns in the plaintext can be easily observed in the ciphertext. For example, an image encrypted with ECB mode will have visible patterns and blocks, making it easy for an attacker to identify certain parts of the image even without decrypting it. Therefore, it is not recommended to use ECB mode for encrypting lengthy messages or sensitive data.

Cipher block chaining (CBC): The cipher block chaining (CBC) mode of operation addresses the issue of repetitive plaintext blocks in ECB mode. This mode XORs each plaintext block with the previous ciphertext block before encryption as shown in Figure 21 . This helps to provide diffusion and makes the encryption process more secure than ECB. Itis worth noting that the sequential nature of CBC encryption can also be an advantage in some cases as it provides a natural form of authentication. If a ciphertext block is corrupted or modified during transmission, the corresponding plaintext block will be affected, and the error will propagate through the rest of the decryption process, making it easier to detect tampering.

However, one-bit change in a plaintext or IV affects all following ciphertext blocks can also be a weakness. This can make it difficult to implement certain types of secure communications protocols such as those that require random access to encrypted data. Additionally, CBC requires a secure and unpredictable initialization vector (IV) for each message, which can be challenging to generate and transmit securely in some scenarios. Finally, as with any mode of operation that relies on a shared secret key, CBC is vulnerable to attacks that exploit weaknesses in the underlying block cipher or key management protocols.

Cipher feedback (CFB): In this mode, the block cipher is used as a feedback mechanism to create a stream cipher. The plaintext is XORed with the output of the block cipher, and the result is encrypted to produce the ciphertext as shown in Figure 22 . This mode allows for variable-length plaintext and provides a self-synchronizing stream cipher. The initial value is called the initialization vector (IV), and it is used to seed the process. The size of the shift registers determines the amount of feedback. For example, if s = 8, the encryption process operates on an 8-bit subset of the plaintext block at a time. If s = n, then the entire plaintext block is used at once.

One advantage of CFB mode is that it allows for error propagation to be contained. If a bit error occurs during transmission, only the block that contains the error is affected. The other blocks remain unchanged. However, one disadvantage of CFB mode is that it is sequential, which means that it cannot be parallelized.

Output feedback (OFB): OFB mode operates on full blocks of plaintext and ciphertext such as other block cipher modes of operation. However, instead of encrypting the plaintext, the block cipher is used to encrypt an IV to generate a keystream. The keystream is then XORed with the plaintext to produce the ciphertext. The key stream is generated independently for each block, so the encryption and decryption can be parallelized as shown in Figure 23 . The main difference between OFB and CFB is that OFB generates a key stream that is independent of the plaintext, while CFB uses the ciphertext as feedback to generate the key stream.

Counter (CTR): This mode encrypts a counter value with a block cipher to produce a keystream, which is then XORed with the plaintext to produce the ciphertext. This mode is similar to OFB, but it allows for parallel encryption and decryption and can be used for random. The counter is incremented for each block of plaintext, and the resulting keystream is used to encrypt that block, see Figure 24 . The advantage of the CTR mode is that it allows for parallel encryption and decryption of blocks since the keystream is generated independently of the plaintext or ciphertext. This can lead to significant speed improvements over other modes, particularly for large messages.

One potential drawback of CTR mode is the need to ensure that the counter values are never repeated as this could compromise the security of the encryption. This can be achieved by using a unique counter value for each block of plaintext, for example by using a nonce (a number used only once) as part of the counter value.

research article about cryptography

ECB mode encryption.

research article about cryptography

CBC mode encryption.

research article about cryptography

CFB mode encryption.

research article about cryptography

OFB mode encryption.

research article about cryptography

Counter mode encryption.

4. Asymmetric key cryptography

Asymmetric key cryptography, also known as public-key cryptography, is a cryptographic system that uses a pair of keys to encrypt and decrypt data. The pair of keys consists of a public key, which is known to everyone, and a private key, which is kept secret by its owner. The public key is used for encrypting the data, while the private key is used for decrypting the data. Unlike symmetric key cryptography, where the same key is used for both encryption and decryption, in asymmetric key cryptography, the two keys are mathematically related, but it is computationally infeasible to derive the private key from the public key.

The main advantage of asymmetric key cryptography is that it provides a secure method of communication between two parties without the need for a pre-shared secret key. Asymmetric key cryptography is used in many applications, including digital signatures, key exchange, and encryption of sensitive data.

Some examples of asymmetric key cryptographic algorithms include RSA [ 26 ], Diffie-Hellman [ 27 ], and elliptic curve cryptography (ECC) [ 28 ]. These algorithms are widely used in various applications, including secure communication, digital signatures, and online transactions [ 29 ].

RSA is a widely used public-key cryptosystem. It is been named after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman. Its security is based on the difficulty of factoring large integers, which serves as the foundation for its mathematical operation. RSA has been used for over four decades and is still considered a secure and practical public-key cryptosystem. RSA involves the generation of a public and a private key pair. The public key is distributed to others, while the private key is kept secret. The public key can be used to encrypt messages that only the owner of the private key can decrypt.

Choose two large prime numbers p and q.

Calculate n = p * q and φ(n) = (p−1) * (q−1).

Choose an integer e such that 1 < e < φ(n) and gcd(e, φ(n)) = 1. This value is called the public exponent.

Compute d, the multiplicative inverse of e modulo φ(n). This value is called the private exponent.

Represent the plaintext M as a positive integer less than n.

Compute the ciphertext C as C = Me mod n.

Decryption : Compute the plaintext M as M = Cd mod n.

The security of RSA is based on the difficulty of factoring large composite numbers into their prime factors. Breaking RSA encryption requires factoring the modulus n into its two prime factors p and q, which is a computationally intensive task for large values of n. Therefore, the security of RSA increases as the size of the keys and the modulus increase.

4.2 Diffie-Hellman

Diffie-Hellman (DH) is a key exchange algorithm that allows two parties to establish a shared secret key over an insecure channel. It was developed by Whitfield Diffie and Martin Hellman in 1976 and is based on the discrete logarithm problem in modular arithmetic.

Alice and Bob publicly agree on a large prime number p and a primitive root of p, denoted by g.

Alice randomly chooses a secret integer a and calculates A = g^a mod p. She sends A to Bob.

Bob randomly chooses a secret integer b and calculates B = g^b mod p. He sends B to Alice.

Alice computes the shared secret key as K = B^a mod p.

Bob computes the shared secret key as K = A^b mod p.

Alice and Bob now have a shared secret key that can be used for symmetric encryption.

The security here relies on the fact that computing the discrete logarithm of g mod p is computationally infeasible. This means that an attacker who intercepts A and B cannot calculate a or b, and therefore cannot compute the shared secret key K.

The DH algorithm can be used for secure communication by combining it with a symmetric encryption algorithm. The shared secret key derived using DH is used as the key for the symmetric encryption algorithm, providing confidentiality for communication. Widely used in many cryptographic protocols such as Secure Socket Layer (SSL)/Transport Layer Security (TLS), Secure Shell Protocol (SSH), and Virtual private networks (VPNs) [ 31 , 32 ]. However, it does not provide authentication [ 32 ], and therefore a man-in-the-middle attack is possible if the channel is not authenticated. To address this issue, DH is often used in combination with digital signatures or other authentication mechanisms [ 33 ].

5. Hash functions

Deterministic: The same input should always produce the same output.

Uniform: The output should appear to be random and uniformly distributed, even if the input has patterns or biases.

One-way: It should be computationally infeasible to derive the input data from the hash value.

Collision-resistant: It should be computationally infeasible to find two different input values that produce the same hash output.

Hash functions are commonly used in various security applications such as password storage, digital signatures, and message authentication codes.

6. Digital signatures

Digital signatures are used to ensure the authenticity, integrity, and non-repudiation of a digital document or message. The process of creating a digital signature involves applying a mathematical algorithm to the message or document using the signer’s private key. The resulting value, known as the signature, is unique to both the message and the signer’s private key.

The receiver of the message or document can verify the signature using the signer’s public key, which confirms that the message was indeed sent by the signer and that it has not been altered since it was signed.

Digital signatures can be used in a variety of applications, including software updates, online transactions, and legal documents. They provide a means of verifying the identity of the sender, ensuring the integrity of the message or document, and preventing the sender from denying that they sent the message or document .

7. Future of cryptography

Cryptography has come a long way since its early beginnings, and it continues to play a critical role in securing our digital world today. The advancement of technology has led to more complex and sophisticated encryption methods, which have become essential for protecting sensitive information such as financial transactions, personal data, and confidential communication. With the rise of the internet and mobile technology, cryptography has become more important than ever. It is used in everything from e-commerce to social media to secure online communication [ 34 ]. As technology continues to evolve, so will the field of cryptography, and new techniques and algorithms will be developed to stay ahead of emerging threats. The future of cryptography holds great promise as researchers work to develop quantum-resistant encryption and new methods for securing blockchain technology. As we rely more and more on digital communication and storage, the role of cryptography in securing our data will only become more critical.

7.1 Quantum cryptography

Quantum computers have the potential to break many of the current cryptographic schemes that rely on the difficulty of certain mathematical problems [ 35 ]. Quantum cryptography aims to develop new cryptographic schemes that are resistant to attacks by quantum computers [ 36 ]. It makes use of the principles of quantum mechanics to provide a high level of security. Also, uses quantum mechanical properties to protect information in transit.

In traditional cryptography, the security of the system relies on the complexity of mathematical algorithms, while in quantum cryptography, the security relies on the laws of physics. Specifically, quantum cryptography uses the principle of quantum entanglement, which involves the correlation of quantum states between two particles.

The most widely known application of quantum cryptography is quantum key distribution (QKD) [ 37 ]. QKD is a protocol that enables two parties to establish a shared secret key that is completely secure against eavesdropping, even by an attacker with unlimited computing power. QKD works by transmitting a series of quantum states, or qubits, between two parties, typically named Alice and Bob. The qubits are generated using a laser and a polarizer. Alice sends a random sequence of polarizations to Bob, who measures the polarizations using his own set of polarizers. By comparing the polarizations, Alice and Bob can detect the presence of an eavesdropper.

There are many challenges to overcome before quantum cryptography can be widely adopted. One of the main challenges is the difficulty of building practical quantum cryptography systems, which require precise control of the quantum states involved. Additionally, there is a need for more research in quantum computing, as well as a need for new protocols that can be used to secure communications in different contexts.

7.2 Homomorphic encryption

Homomorphic encryption is another type of encryption that allows computation to be performed on ciphertext [ 38 ], which means that data can be encrypted and manipulated without the need to decrypt it first. In other words, it enables computations to be performed on data without revealing the data itself. This is a significant breakthrough in the field of cryptography as it allows for secure computation and data analysis without compromising privacy [ 39 ]. Homomorphic encryption has numerous applications in various fields such as finance, healthcare, and cloud computing [ 40 ]. For instance, it can be used to perform secure data analysis on sensitive data [ 41 ], such as medical records, without the need to reveal the data to unauthorized parties. It can also be used in cloud computing to protect data privacy while still allowing for secure computation in the cloud.

7.3 Block chain cryptography

Blockchain-based cryptography is a critical component of blockchain technology, which is widely used in various fields such as finance, healthcare, and supply chain management [ 42 ]. it is a distributed ledger that records transactions in a secure and transparent manner. Cryptography is used in blockchain to ensure the confidentiality, integrity, and authenticity of data stored in the blockchain network.

One of the essential cryptographic techniques used in blockchain is the digital signature. A digital signature is a mathematical scheme that validates the authenticity and integrity of a message or data. Digital signatures are used to verify transactions in the blockchain network, ensuring that the sender is the actual owner of the assets and preventing any tampering of the data [ 42 ].

Another critical cryptographic technique used in the blockchain is hash functions. Hash functions are used to create a unique digital fingerprint of data stored in the blockchain network. This unique digital fingerprint, also known as a hash value, ensures that the data is tamper-proof and cannot be altered without being detected.

Blockchain technology also employs public-key cryptography, which is a cryptographic technique that uses a pair of keys, one public and one private. Public keys are used to encrypt data, while private keys are used to decrypt data. This technique ensures the confidentiality and security of data stored in the blockchain network.

Blockchain-based cryptography plays a vital role in ensuring the security and transparency of data stored in the blockchain network. As blockchain technology continues to evolve, we can expect to see new cryptographic techniques and algorithms that will further enhance the security and efficiency of blockchain-based applications.

7.4 Multiparty computation

Multiparty computation (MPC) is a cryptographic technique that enables a group of parties to jointly compute a function on their private inputs, without revealing those inputs to each other or to any third party. This technique allows parties to collaborate and compute a result without sharing their individual data, which can be particularly useful in scenarios where data privacy is critical, such as in financial transactions or medical research [ 43 ].

Each party inputs its private data into the system, which then generates a shared output based on the combined inputs of all parties. The protocol ensures that no individual party can learn anything about the private inputs of any other party, and the final output is only known to those parties who have contributed inputs.

MPC has many practical applications, including secure auctions, electronic voting systems, and privacy-preserving data analysis. However, it can be computationally expensive, especially when the number of parties and the complexity of the function being computed increase. Despite these challenges, MPC is a powerful tool for achieving secure collaboration and computation among multiple parties [ 44 ].

7.5 Lightweight cryptography

Lightweight cryptography refers to a subset of cryptographic algorithms that are specifically designed to operate efficiently on low-resource devices such as smart cards, RFID tags, and wireless sensor nodes. These devices often have limited processing power, memory, and energy resources, making it challenging to implement traditional cryptographic algorithms on them. Lightweight cryptography aims to address these challenges by developing cryptographic algorithms that have low computational and memory requirements, while still providing a reasonable level of security.

The development of lightweight cryptography has become increasingly important with the proliferation of the Internet of Things (IoT) and other low-power, low-cost devices. These devices are becoming more prevalent in our daily lives, and many of them require secure communication and authentication. Lightweight cryptography can provide a practical and efficient solution for securing these devices, without sacrificing security. Some examples of lightweight cryptography algorithms include SIMON and SPECK block ciphers, which were designed by the National Security Agency (NSA) for use in constrained environments. Another example is the lightweight version of the advanced encryption standard (AES), known as AES-Lite. These algorithms have been adopted by various standardization bodies and are widely used in industry for securing low-resource devices.

8. Conclusions

Cryptography is a critical aspect of modern information security. It has evolved significantly over time, from basic substitution ciphers to sophisticated algorithms that provide secure communication and transactions. Today, we have various types of cryptographic schemes, including symmetric and asymmetric encryption, hash functions, digital signatures, homomorphic encryption, and multiparty computation. The development of lightweight cryptography has also enabled secure communication and transactions on low-power devices such as IoT devices. As technology continues to advance, the field of cryptography will play an increasingly vital role in ensuring secure communication and transactions in an interconnected world. The future of cryptography is exciting and promising, and we can expect to see more innovations that will enhance the security and privacy of our digital world.

  • 1. Bruce S. Applied cryptography: protocols, algorithms, and source code in C. 2nd ed. Hoboken, New Jersey: John Wiley & Sons; 1996
  • 2. Diffie W, Hellman ME. Multiuser cryptographic techniques. In: Proceedings of the June 7-10, 1976, national computer conference and exposition. ACM Digital Library; 1976. pp. 109-112
  • 3. Blakley GR, Borosh I. Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages. Computers & Mathematics with Applications. 1979; 5 :169-178
  • 4. Rescorla E. Diffie-Hellman Key Agreement Method. 2070-1721, 1999
  • 5. Sobti R, Geetha G. Cryptographic hash functions: A review. International Journal of Computer Science Issues (IJCSI). 2012; 9 :461
  • 6. Rogaway P, Shrimpton T. Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: FSE, 2004, Lecture Notes in Computer Science. Vol. 3017. Springer Verlag; 2004. pp. 371-388
  • 7. Menezes AJ, van Oorschot PC, Vanstone SA. Handbook of applied cryptography (202101 ed.). 2021; 1 :1-810
  • 8. Wong D. Real-world cryptography. Shelter Island, NY: Manning Publications; 2021
  • 9. Chaubey NK, Prajapati BB. Quantum cryptography and the future of cyber security. Hershey, PA: IGI Global; 2020. DOI: 10.4018/978-1-7998-2253-0
  • 10. Poongothai T, Jayarajan K, Rajeshkumar G, Patra P. Blockchain technology in healthcare applications. Journal of Critical Reviews. 2020; 7 :8701-8707
  • 11. Bertaccini M. Cryptography algorithms: A guide to algorithms in blockchain, quantum cryptography, zero - knowledge protocols, and omomorphic encryption. Birmingham, UK: Packt Publishing, Limited; 2022. DOI: 10.1007/978-183882-844-4
  • 12. Singh S. The Code Book. Vol. 7. New York: Doubleday; 1999
  • 13. Davies D. A brief history of cryptography. Information Security Technical Report. 1997; 2 :14-17
  • 14. Mendelsohn CJ. Blaise de Vigenère and the “Chiffre Carré”. In: Proceedings of the American Philosophical Society. 1940; 83 (4):103-129
  • 15. Schrödel T. Breaking short Vigenère ciphers. Cryptologia. 2008; 32 :334-347
  • 16. Wade NJ. Charles Wheatstone (1802–1875). ed: SAGE Publications ed. Vol. 31. London, England: Sage UK; 2002. pp. 265-272
  • 17. Kruh L. Cipher equipment. Cryptologia. 1977; 1 :143-149
  • 18. Smart NP, Smart NP. The enigma machine. Cryptography Made Simple. 2016; 64 (2):133-161
  • 19. Sidhu A. Analyzing modern cryptography techniques and reviewing their timeline. Security and Communication Networks. 2023; 10 :1-18
  • 20. Stamp M. Information security: principles and practice. Hoboken, NJ: John Wiley & Sons; 2011
  • 21. Smid ME. Development of the advanced encryption standard. Journal of Research of the National Institute of Standards and Technology. 2021; 126 :1-18
  • 22. Daemen J, Rijmen V. AES proposal: Rijndael. National Institute of Standards and Technology; 1999
  • 23. Schneier B. Description of a new variable-length key, 64 bit block cipher (Blowfish). In: Fast Software Encryption: Cambridge Security Workshop Cambridge, UK, December 9 11, 1993 Proceedings. Berlin, Heidelberg: Springer; 2005. pp. 191-204
  • 24. Schneier B. The twofish encryption algorithm. Dr Dobb's Journal: Software Tools for the Professional Programmer. 1998; 23 :30-34
  • 25. Rivest RL. The RC4 encryption algorithm, 1992. Vol. 25. RSA Data Security Inc.; 2016. pp. 1-23.
  • 26. Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 1978; 21 :120-126
  • 27. Hellman M. New directions in cryptography. IEEE Transactions on Information Theory. 1976; 22 :644-654
  • 28. Lenstra HW. Factoring integers with elliptic curves. Annals of Mathematics. 1987; 126 (3):649-673
  • 29. Pachghare V. Cryptography and information security. Noida, Uttar Pradesh, India: PHI Learning Pvt. Ltd.; 2019
  • 30. Katz J, Lindell Y. Introduction to modern cryptography. Boca Raton, FL: CRC Press; 2020
  • 31. Li Y. Design and analysis of cryptographic protocols [Dissertation], 2015. Bochum: Ruhr-Universität Bochum; 2016
  • 32. Carts DA. A review of the Diffie-Hellman algorithm and its use in secure internet protocols. SANS Institute; 2001; 751 :1-7
  • 33. Medina R III. Systems and Methods for Digital Signature Detection. ed: Google Patents ed. 2015
  • 34. Tarawneh M, AlZyoud F, Sharrab Y, Kanaker H. Secure E-health framework in cloud-based environment. In: 2022 International Arab Conference on Information Technology (ACIT). IEEE; 2022. pp. 1-5
  • 35. Subramani S, Svn SK. Review of security methods based on classical cryptography and quantum cryptography. Cybernetics and Systems. 2023; 54 (1):1-19
  • 36. Mavroeidis V, Vishi K, Zych MD, Jøsang A. The impact of quantum computing on present cryptography. arXiv Preprint arXiv:1804.00200. 2018
  • 37. Renner R. Security of quantum key distribution. International Journal of Quantum Information. 2008; 6 :1-127
  • 38. Lauter KE, Dai W, Laine K. Protecting privacy through homomorphic encryption. Cham, Switzerland: Springer; 2022
  • 39. Doan TVT, Messai M-L, Gavin G, Darmont J. A survey on implementations of homomorphic encryption schemes. The Journal of Supercomputing. 2023; 79 :15098-15139
  • 40. Chatterjee A, Aung KMM. Fully homomorphic encryption in real world applications. Singapore: Springer; 2019
  • 41. Viand A, Knabenhans C, Hithnawi A. Verifiable fully homomorphic encryption. arXiv Preprint arXiv:2301.07041. 2023
  • 42. Bolfing A. Cryptographic Primitives in Blockchain Technology: A Mathematical Introduction. New York, USA: Oxford University Press; 2020
  • 43. Goldreich O. Secure multi-party computation. Manuscript. Preliminary version. 1998; 78 :1-78
  • 44. Darby ML, Nikolaou M. MPC: Current practice and challenges. Control Engineering Practice. 2012; 20 :328-342

© 2023 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution 3.0 License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • View all journals
  • Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts

Spotlight  01 November 2023

Cryptography

Digital information relies on encryption to keep it secure, relying on algorithms developed in the 1970s. But the anticipated arrival of practical quantum computers could be a game-changer, requiring new solutions.

An employee stands next to the D-Wave Systems Advantage quantum computer, lit only by an orange glow.

Keeping secrets in a quantum world

Cryptographers are preparing for new quantum computers that will break their ciphers.

  • Neil Savage

Partner content

research article about cryptography

Vigilance still critical in highly encrypted networks

Data encryption provides greater security, but it also makes cyber-attacks harder to spot.

research article about cryptography

End-to-end protection for sensitive data

Cutting-edge cryptographic techniques being developed in Japan promise a world where personal and sensitive information remains secure throughout its lifecycle.

research article about cryptography

Synthetic data to enhance patient privacy

Researchers in Singapore are developing innovative methods to secure health data, reduce patient privacy concerns, and accelerate bioinformatics research.

Quick links

  • Explore articles by subject
  • Guide to authors
  • Editorial policies

research article about cryptography

research article about cryptography

Watermarking PRFs and PKE Against Quantum Adversaries

  • Fuyuki Kitagawa
  • Ryo Nishimaki

research article about cryptography

Cryptographic Primitives with Hinting Property

  • Navid Alamati
  • Sikhar Patranabis

research article about cryptography

Analysis of Multivariate Encryption Schemes: Application to Dob and \({C}^{*}\)

  • Morten Øygarden
  • Patrick Felke
  • Håvard Raddum

research article about cryptography

Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery

  • Qianqian Yang

research article about cryptography

Bitcoin as a Transaction Ledger: A Composable Treatment

  • Christian Badertscher
  • Ueli Maurer
  • Vassilis Zikas

research article about cryptography

(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates

  • Aggelos Kiayias
  • Feng-Hao Liu
  • Yiannis Tselekounis

research article about cryptography

Bandwidth-Hard Functions: Reductions and Lower Bounds

  • Jeremiah Blocki
  • Peiyuan Liu
  • Samson Zhou

research article about cryptography

The COLM Authenticated Encryption Scheme

  • Elena Andreeva
  • Andrey Bogdanov

research article about cryptography

Collision Resistance from Multi-collision Resistance

  • Ron D. Rothblum
  • Prashant Nalini Vasudevan

Entropy Computation for Oscillator-based Physical Random Number Generators

  • David Lubicz
  • Viktor Fischer

research article about cryptography

Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting

  • Dennis Hofheinz
  • Jessica Koch
  • Christoph Striecks

research article about cryptography

Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm

  • Dmitrii Koshelev

research article about cryptography

Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash Functions

research article about cryptography

Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3

  • Marc Fischlin
  • Felix Günther
  • Christian Janson

research article about cryptography

(Inner-Product) Functional Encryption with Updatable Ciphertexts

  • Valerio Cini
  • Sebastian Ramacher
  • Erkan Tairi

research article about cryptography

Cryptographic Competitions

  • Daniel J. Bernstein

research article about cryptography

Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation

  • Gabrielle De Micheli
  • Pierrick Gaudry
  • Cécile Pierrot

research article about cryptography

Masking the GLP Lattice-Based Signature Scheme at Any Order

  • Gilles Barthe
  • Sonia Belaïd
  • Mehdi Tibouchi

research article about cryptography

Lattice-Based Programmable Hash Functions and Applications

  • Jiang Zhang
  • Zhenfeng Zhang

research article about cryptography

BLEACH: Cleaning Errors in Discrete Computations Over CKKS

  • Nir Drucker
  • Guy Moshkowich
  • Hayim Shaul

research article about cryptography

Breaking the \(O(\sqrt{n})\) -Bit Barrier: Byzantine Agreement with Polylog Bits Per Party

  • Elette Boyle
  • Aarushi Goel

research article about cryptography

Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation

  • Yuval Ishai
  • Alexis Korb

research article about cryptography

Rinocchio: SNARKs for Ring Arithmetic

  • Chaya Ganesh
  • Anca Nitulescu
  • Eduardo Soria-Vazquez

research article about cryptography

Non-malleable Vector Commitments via Local Equivocability

research article about cryptography

Topology-Hiding Communication from Minimal Assumptions

  • Marshall Ball

research article about cryptography

Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs

  • Valence Cristiani
  • Maxime Lecomte
  • Philippe Maurine

research article about cryptography

Compact Structure-Preserving Signatures with Almost Tight Security

  • Masayuki Abe

research article about cryptography

Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)

  • Thomas Attema
  • Michael Klooß

research article about cryptography

A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model

  • Marten van Dijk
  • Chenglu Jin

research article about cryptography

Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires

  • Raine Nieminen
  • Thomas Schneider

research article about cryptography

Fine-Grained Secure Attribute-Based Encryption

research article about cryptography

Cover Attacks for Elliptic Curves over Cubic Extension Fields

research article about cryptography

Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic

  • Mariya Georgieva Belorgey
  • Sergiu Carpov
  • Mohsen Mohammadi

research article about cryptography

Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation

  • Arpita Patra

research article about cryptography

Unbounded Predicate Inner Product Functional Encryption from Pairings

  • Uddipana Dowerah
  • Subhranil Dutta

research article about cryptography

Parameter Optimization and Larger Precision for (T)FHE

  • Loris Bergerat

research article about cryptography

Candidate iO from Homomorphic Encryption Schemes

  • Zvika Brakerski
  • Nico Döttling
  • Giulio Malavolta

research article about cryptography

Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model

  • Carmit Hazay
  • Muthuramakrishnan Venkitasubramaniam

research article about cryptography

On the Power of an Honest Majority in Three-Party Computation Without Broadcast

research article about cryptography

Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious

Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors.

  • Benoît Libert
  • Huaxiong Wang

research article about cryptography

MPClan: Protocol Suite for Privacy-Conscious Computations

  • Nishat Koti
  • Shravani Patil
  • Ajith Suresh

research article about cryptography

High-Throughput Secure Three-Party Computation with an Honest Majority

  • Jun Furukawa
  • Yehuda Lindell
  • Or Weinstein

research article about cryptography

Must the Communication Graph of MPC Protocols be an Expander?

  • Pavel Hubáček

research article about cryptography

Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning

  • Sayandeep Saha
  • Manaar Alam
  • Pallab Dasgupta

research article about cryptography

Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró

  • Murilo Coutinho
  • Iago Passos
  • Fábio Borges

research article about cryptography

I Want to Ride My BICYCL  : BICYCL  Implements CryptographY in CLass Groups

  • Cyril Bouvier
  • Guilhem Castagnos
  • Fabien Laguillaumie

research article about cryptography

Revisiting the Efficiency of Asynchronous MPC with Optimal Resilience Against General Adversaries

  • Ananya Appan
  • Anirudh Chandramouli
  • Ashish Choudhury

research article about cryptography

Fast Large-Scale Honest-Majority MPC for Malicious Adversaries

  • Koki Hamada

research article about cryptography

NIZK from SNARGs

  • Takahiro Matsuda
  • Takashi Yamakawa

research article about cryptography

  • Find a journal
  • Publish with us
  • Track your research

A New Approach of Cryptography for Data Encryption and Decryption

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

cryptography-logo

Journal Menu

  • Cryptography Home
  • Aims & Scope
  • Editorial Board
  • Reviewer Board
  • Instructions for Authors
  • Special Issues
  • Sections & Collections
  • Article Processing Charge
  • Indexing & Archiving
  • Most Cited & Viewed
  • Journal Statistics
  • Journal History

Editorial Office

Journal browser.

  • arrow_forward_ios Forthcoming issue arrow_forward_ios Current issue
  • Vol. 8 (2024)
  • Vol. 7 (2023)
  • Vol. 6 (2022)
  • Vol. 5 (2021)
  • Vol. 4 (2020)
  • Vol. 3 (2019)
  • Vol. 2 (2018)
  • Vol. 1 (2017)

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

About Cryptography

Cryptography  (ISSN 2410-387X) is an international, peer-reviewed open access journal which provides the state-of-the-art forum for original results in all areas of modern cryptography, including secret-key cryptography, public-key cryptography, hash functions, cryptanalysis, cryptographic protocols, and quantum safe cryptography as well as their practice, implementation, application, and related standards. Cryptography will publish high-quality reviews, regular research papers and short communications in all areas of theory and practice of modern cryptography.

Topics covered by Cryptography include the following (but are not limited to):

Cryptographic Tools

  • Secret-key cryptography
  • Lightweight cryptography
  • Public-key cryptography
  • Lattice-based cryptography
  • Hash functions
  • Authentication
  • Anonymity and untraceability
  • Digital signatures
  • Secret sharing
  • Randomness and pseudorandomness
  • Cryptanalysis
  • Quantum safe cryptography

Cryptographic Protocols

  • Secure multiparty computation
  • Key management
  • Zero-knowledge proofs
  • Blockchains
  • Digital rights management
  • Digital money
  • Voting/auction systems

Cryptographic Engineering

  • Cryptographic standards
  • Side-channel/fault attacks
  • Tamper-proof hardware
  • Secure smart systems/devices
  • Security evaluation

Foundations of Cryptology

  • Mathematics of cryptology
  • Statistical models in cryptography
  • Formal verification of cryptographic primitives
  • Theory of cryptographic computations
  • Quantum Physics cryptography

Social Impact of Cryptography

  • Ethical implications of cryptography
  • Human-oriented cryptography
  • Cryptography-supported democracy
  • e-Goverment cryptography

MDPI Publication Ethics Statement

research article about cryptography

Book Reviews

MDPI St. Alban-Anlage 66 CH-4052 Basel Switzerland

Copyright / Open Access

Reprints may be ordered. Please contact for more information on how to order reprints.

Announcement and Advertisement

Announcements regarding academic activities such as conferences are published for free in the News & Announcements section of the journal. Advertisement can be either published or placed on the pertinent website. Contact e-mail address is .

For further MDPI contacts, see here .

Further Information

Mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

Help | Advanced Search

Computer Science > Cryptography and Security

Title: the instruction hierarchy: training llms to prioritize privileged instructions.

Abstract: Today's LLMs are susceptible to prompt injections, jailbreaks, and other attacks that allow adversaries to overwrite a model's original instructions with their own malicious prompts. In this work, we argue that one of the primary vulnerabilities underlying these attacks is that LLMs often consider system prompts (e.g., text from an application developer) to be the same priority as text from untrusted users and third parties. To address this, we propose an instruction hierarchy that explicitly defines how models should behave when instructions of different priorities conflict. We then propose a data generation method to demonstrate this hierarchical instruction following behavior, which teaches LLMs to selectively ignore lower-privileged instructions. We apply this method to GPT-3.5, showing that it drastically increases robustness -- even for attack types not seen during training -- while imposing minimal degradations on standard capabilities.

Submission history

Access paper:.

  • HTML (experimental)
  • Other Formats

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/cryptography

Cryptography

Cryptography uses mathematical techniques to transform data and prevent it from being read or tampered with by unauthorized parties. That enables exchanging secure messages even in the presence of adversaries. Cryptography is a continually evolving field that drives research and innovation. The Data Encryption Standard (DES), published by NIST in 1977 as a  Federal Information Processing Standard  (FIPS), was groundbreaking for its time but would fall far short of the levels of protection needed today.

As our electronic networks grow increasingly open and interconnected, it is crucial to have strong, trusted cryptographic standards and guidelines, algorithms and encryption methods that provide a foundation for e-commerce transactions, mobile device conversations and other exchanges of data. NIST has fostered the development of cryptographic techniques and technology for 50 years through an open process which brings together industry, government, and academia to develop workable approaches to cryptographic protection that enable practical security. 

Our work in cryptography has continually evolved to meet the needs of the changing IT landscape. Today, NIST cryptographic solutions are used in commercial applications from tablets and cellphones to ATMs, to secure global eCommcerce, to protect US federal information and even in securing top-secret federal data. NIST looks to the future to make sure we have the right cryptographic tools ready as new technologies are brought from research into operation. For example, NIST is now working on a process to develop new kinds of cryptography to protect our data when quantum computing becomes a reality. At the other end of the spectrum, we are advancing so-called lightweight cryptography to balance security needs for circuits smaller than were dreamed of just a few years ago.

In addition to standardizing and testing cryptographic algorithms used to create virtual locks and keys, NIST also assists in their use. NIST’s validation of strong algorithms and implementations builds confidence in cryptography—increasing its use to protect the privacy and well-being of individuals and businesses.

NIST continues to lead public collaborations for developing modern cryptography, including:

  • Block ciphers ,  which encrypt data in block-sized chunks (rather than one bit at a time) and are useful in encrypting large amounts of data. 
  • Cryptographic hash algorithms ,  which create short digests, or hashes, of the information being protected. These digests find use in many security applications including  digital signatures (the development of which NIST also leads). 
  • Key establishment ,  employed in  public-key cryptography  to establish the data protection keys used by the communicating parties. 
  • Post-quantum cryptography ,  intended to be secure against both quantum and classical computers and deployable without drastic changes to existing communication protocols and networks. 
  • Lightweight cryptography ,  which could be used in small devices such as Internet of Things (IoT) devices and other resource-limited platforms that would be overtaxed by current cryptographic algorithms.
  • Privacy-enhancing cryptography ,  intended to allow research on private data without revealing aspects of the data that could be used to identify its owner. 
  • Digital Signatures , which is an electronic analogue of a written signature that provides assurance that the claimed signatory signed, and the information was not modified after signature generation.
  • Random Bit Generation , which is a device or algorithm that can produce a sequence of bits that appear to be both statistically independent and unbiased.

NIST also promotes the use of validated cryptographic modules and provides Federal agencies with a security metric to use in procuring equipment containing validated cryptographic modules through other efforts including: FIPS 140 , Cryptographic Programs and Laboratory Accreditation  Cryptographic Module Validation Program (CMVP) , Cryptographic Algorithm Validation Program (CAVP) , and Applied Cryptography at NIST's National Cybersecurity Center of Excellence (NCCoE ).

Featured Content

Post quantum encryption.

Post-Quantum Cryptography: the Good, the Bad, and the Powerful

Post-Quantum Cryptography: A Q&A With NIST’s Matt Scholl

Collage illustration of servers, laptops and phones is divided into left "Old Encryption Standards" and right "New Encryption Standards."

NIST to Standardize Encryption Algorithms That Can Resist Attack by Quantum Computers

Shield labeled "Update" is surrounded by icons for Internet of Things applications like fitness trackers and smart home systems.

NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices

In illustration featuring a laptop, text with the letters SHA-1 is crossed out, with check marks next to the letters SHA-2 and SHA-3.

NIST Retires SHA-1 Cryptographic Algorithm

Suggestions or feedback?

MIT News | Massachusetts Institute of Technology

  • Machine learning
  • Social justice
  • Black holes
  • Classes and programs

Departments

  • Aeronautics and Astronautics
  • Brain and Cognitive Sciences
  • Architecture
  • Political Science
  • Mechanical Engineering

Centers, Labs, & Programs

  • Abdul Latif Jameel Poverty Action Lab (J-PAL)
  • Picower Institute for Learning and Memory
  • Lincoln Laboratory
  • School of Architecture + Planning
  • School of Engineering
  • School of Humanities, Arts, and Social Sciences
  • Sloan School of Management
  • School of Science
  • MIT Schwarzman College of Computing

Cryptography

Download RSS feed: News Articles / In the Media / Audio

Headshot of Yael Tauman Kalai

Yael Tauman Kalai PhD ’06 awarded 2022 ACM Prize in Computing

The MIT EECS adjunct associate professor and CSAIL member has been recognized for her outstanding contributions to cryptography.

April 19, 2023

Read full story →

Peter Shor stands at a microphone, speaking, with an MIT banner behind him.

It’s a weird, weird quantum world

In MIT’s 2023 Killian Lecture, Peter Shor shares a brief history of quantum computing from a personal viewpoint.

March 10, 2023

Abstract image of a phone laying flat on a table, with a hologram of a graduation cap with icons representing education connected by lines hovering over it.

The “last mile” from credentials to employment

Digital Credentials Consortium’s new report explores barriers to adoption.

November 3, 2022

Peter Shore smiles with arms crossed to camera in front of a chalkboard

Peter Shor wins Breakthrough Prize in Fundamental Physics

MIT professor to share $3 million prize with three others; Daniel Spielman PhD ’95 wins Breakthrough Prize in Mathematics.

September 22, 2022

Peter Shor sits in a chair in front of a chalkboard

Peter Shor receives 2022-2023 Killian Award

The MIT professor is honored for extraordinary accomplishments in mathematics, computer science, and quantum physics.

May 11, 2022

Left: A white box with wires coming out of it, surrounded by brick-like black slabs. Right: Closeup of a sensor featuring a circular glass shield with three smaller circular glass disks on top

Portable technology offers boost for nuclear security, arms control

MIT team devises compact, affordable system for identifying elemental composition of nuclear and other materials.

June 10, 2021

Photo of MIT's Stata Center, an iconic building comprised of crazy angles and unusual materials

MIT launches new data privacy-focused initiative

Future of Data, Trust, and Privacy initiative aims to address AI-driven analytics and changing attitudes about personal data.

April 20, 2021

Nina Levine sitting on outdoor steps of MIT building

Working toward a more secure world

Senior Nina Levine is researching technologies for detecting radioactive material, as she pursues a dual path in nuclear science and policy.

March 25, 2021

Four maps showing locations of power outages in Florida after Hurricane Matthew

Eight Lincoln Laboratory technologies named 2020 R&D 100 Award winners

Several of the winning innovations apply artificial intelligence to solutions for challenges to national security.

October 20, 2020

Left to right: David Sabatini, Kerry Emanuel, and Peter Shor, 2020 recipients of BBVA Frontiers of Knowledge Awards

Kerry Emanuel, David Sabatini, and Peter Shor receive BBVA Frontiers of Knowledge awards

Laureates recognized for contributions to climate change, biomedicine, and quantum cryptography.

May 8, 2020

Areg Danagoulian’s MIT team has brought the best science to arms control and provided a creative solution that can reduce nuclear threats and enhance security.

3 Questions: Areg Danagoulian on a new arms control tool and the future of nuclear security

Danagoulian and his research team developed a system that could greatly improve the process for verifying compliance of nuclear warheads.

April 23, 2020

Testing a voting system may show that certain adversarial attacks don’t work, but it doesn’t reveal that there are no attacks that work.

3 Questions: Ron Rivest on trusting electronic voting systems

MIT cryptography expert and election technology developer explains how to verify an election outcome.

February 26, 2020

Areg Danagoulian has committed himself to generating new technologies that reduce nuclear security threats and that offer game-changing options in the arena of nuclear nonproliferation and treaty verification.

Advancing nuclear detection and inspection

Assistant professor of nuclear science and engineering Areg Danagoulian probes deep inside cargo containers and ballistic warheads to ferret out fissile materials.

November 14, 2019

research article about cryptography

How to dismantle a nuclear bomb

MIT team successfully tests a new method for verification of weapons reduction.

September 30, 2019

Whirlwind I, the first digital computer capable of real-time computation

Twenty-five ways in which MIT has transformed computing

From digital circuits to ingestible robots, the Institute has helped spearhead key innovations in the technology revolution.

February 25, 2019

Massachusetts Institute of Technology 77 Massachusetts Avenue, Cambridge, MA, USA

  • Map (opens in new window)
  • Events (opens in new window)
  • People (opens in new window)
  • Careers (opens in new window)
  • Accessibility
  • Social Media Hub
  • MIT on Facebook
  • MIT on YouTube
  • MIT on Instagram

IMAGES

  1. (PDF) A Review Paper on Cryptography

    research article about cryptography

  2. A Brief Overview of Cryptography

    research article about cryptography

  3. (PDF) Research on Various Cryptography Techniques

    research article about cryptography

  4. (PDF) Study of Cryptography and Steganography System

    research article about cryptography

  5. (PDF) Importance of Cryptography in Information Security

    research article about cryptography

  6. (PDF) Cryptography Algorithms and approaches used for data security

    research article about cryptography

VIDEO

  1. Computing on Encryption Data: Functional Encryption and More

  2. The Cryptographers' Panel

  3. Outline of cryptography

  4. Cryptography and Information Security Top 20 Important Questions

  5. New Advances in Cryptography for Anonymity by Stefano Tessaro

  6. Zero-Knowledge Proofs

COMMENTS

  1. (PDF) A Review Paper on Cryptography

    Cryptography has the importa nt purpose of providing reliabl e, strong, and robust network and data security. In this paper, we. demonstrated a review of some of the research that has been ...

  2. Cryptography: Recent research trends of encrypting mathematics

    Cryptography is the study of assured communication procedure which allows only the sender and the intended person to review the message and the content shared. The simplest method used is the symmetric algorithm in which once the message is encrypted it is sent to the recipient along with its secret key. 2.

  3. Cryptography

    Cryptography is an international, scientific, peer-reviewed, open access journal on cryptography published quarterly online by MDPI.. Open Access — free for readers, with article processing charges (APC) paid by authors or their institutions.; High Visibility: indexed within Scopus, ESCI (Web of Science), dblp, and other databases. Journal Rank: CiteScore - Q2 (Applied Mathematics)

  4. 175995 PDFs

    A topic for the discussion of research into Cryptography and Cryptanalysis. | Explore the latest full-text research PDFs, articles, conference papers, preprints and more on CRYPTOGRAPHY. Find ...

  5. Home

    Journal of Cryptology is a comprehensive source for original results in modern information security. Provides a forum for original results in all areas of cryptology. Covers both cryptography and cryptanalysis, including information theoretic and complexity theoretic perspectives. Also discusses implementation, application, and standards issues ...

  6. Cryptography: Recent Advances and Research Perspectives

    Cryptography is considered as a branch of both mathematics and computer science, and it is related closely to information security. This chapter explores the earliest known cryptographic methods, including the scytale, Caesar cipher, substitution ciphers, and transposition ciphers. Also, explains the evolution of these methods over time. The development of symmetric and asymmetric key ...

  7. Entanglement-based secure quantum cryptography over 1,120 ...

    Abstract. Quantum key distribution (QKD) 1, 2, 3 is a theoretically secure way of sharing secret keys between remote users. It has been demonstrated in a laboratory over a coiled optical fibre up ...

  8. Cryptography

    Cryptography Digital information relies on encryption to keep it secure, relying on algorithms developed in the 1970s. But the anticipated arrival of practical quantum computers could be a game ...

  9. Cryptography: Recent research trends of encrypting mathematics

    Introduction to cryptography. Cryptography has its meaning in the Greek language which means "Secret writing". It is a technique to check and achieve the confidentiality of the messages sent between the user by maintaining integrity. The information sent has to be secure and passed through a reliable mode of transfer.

  10. Cryptography

    Cryptography. , Volume 6, Issue 1 (March 2022) - 13 articles. Cover Story ( view full-size image ): Anonymous authentication systems have received the attention of many fields, as they secure user privacy. Both group signatures and ring signatures preserve user anonymity, allowing users to hide their identity within a group.

  11. (PDF) Mathematics for Cryptography: A Guide to Mathematical

    cryptography algorithms, this article aims to equip readers with the foundational knowledge needed to explore these algorithms in greater depth and to engage in the ongoing research and developmen ...

  12. Cryptography

    Cryptography. , Volume 5, Issue 4 (December 2021) - 13 articles. Cover Story ( view full-size image ): As the demand for wearables and fitness trackers is rising, serious concerns over data privacy and security issues are coming into the spotlight. Individual users' sensitive information, such as heart rate, calories burned, or even sleep ...

  13. Articles

    Research Article Open access 29 February 2024 Article: 13 Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting ... BICYCL Implements CryptographY in CLass Groups. Cyril Bouvier; Guilhem Castagnos; Fabien Laguillaumie; Research Article 26 April 2023 Article: 17 ...

  14. A New Approach of Cryptography for Data Encryption and Decryption

    Cryptography is the solution to secure data from different security risks. To enhance the security of communication systems better cryptosystems technology is obvious in the area of cryptography. Our research focuses on data encryption and decryption technique for a better cryptosystem; where we have proposed a new approach that ensures better ...

  15. Quanta Magazine

    The paper has set off a cascade of new research at the interface of cryptography and complexity theory. While both disciplines investigate how hard computational problems are, they come at the question from different mindsets, said Rahul Santhanam, a complexity theorist at the University of Oxford. Cryptography, he said, is fast-moving ...

  16. Cryptography

    Aims. Cryptography (ISSN 2410-387X) is an international, peer-reviewed open access journal which provides the state-of-the-art forum for original results in all areas of modern cryptography, including secret-key cryptography, public-key cryptography, hash functions, cryptanalysis, cryptographic protocols, and quantum safe cryptography as well ...

  17. [2404.13208] The Instruction Hierarchy: Training LLMs to Prioritize

    View PDF HTML (experimental) Abstract: Today's LLMs are susceptible to prompt injections, jailbreaks, and other attacks that allow adversaries to overwrite a model's original instructions with their own malicious prompts. In this work, we argue that one of the primary vulnerabilities underlying these attacks is that LLMs often consider system prompts (e.g., text from an application developer ...

  18. Cryptography

    Cryptography is a continually evolving field that drives research and innovation. The Data Encryption Standard (DES), published by NIST in 1977 as a Federal Information Processing Standard (FIPS), was groundbreaking for its time but would fall far short of the levels of protection needed today. As our electronic networks grow increasingly open ...

  19. (PDF) Cryptography

    Department of Telecommunication Science, University of Ilorin. [email protected]. Ab stract—The wide use of cryptography is a necessary. consequence of the information ...

  20. Cryptography

    Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

  21. Cryptography

    Danagoulian and his research team developed a system that could greatly improve the process for verifying compliance of nuclear warheads. April 23, 2020. Read full story →. 3 Questions: Ron Rivest on trusting electronic voting systems. MIT cryptography expert and election technology developer explains how to verify an election outcome.

  22. Full article: Statement of Retraction: Light weight cryptography-based

    We, the Editors and Publisher of the International Journal of Healthcare Management, have retracted the following article:. Swetha Pesaru, Naresh K. Mallenahalli & B. Vishnu Vardhan (22 Dec 2022): Light weight cryptography-based data hiding system for Internet of Medical Things, International Journal of Healthcare Management, DOI: 10.1080/20479700.2022.2161145

  23. (PDF) Overview of Cryptography

    from the Greek word kryptos, meaning "hidden" or. "secret.". [1] The study and practice of encryption and decryption is. called the science of cryptography. Scientists who study. different ...

  24. Cybersecurity, Cryptography, and Machine Learning

    Cryptography, an international, peer-reviewed Open Access journal. Journals. Active Journals Find a Journal Proceedings Series. ... Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

  25. (PDF) Network Security and Cryptography Challenges and ...

    secret. The most important goals of modern cryptography are. the preservation of users' privacy, the maintenance of data. integrity, and the verification of information validity. [4]. Finding a ...