Javascript must be enabled to continue!
Cryptographic Algorithms and Protocols: Evolution and Future Trend
View through CrossRef
This chapter provides a thorough analysis of cryptographic protocols and algorithms, tracing their development from antiquated to contemporary approaches and predicting emerging developments. It starts with some basic definitions and emphasizes how cryptography uses mathematical operations to encrypt and decrypt data in order to guarantee data secrecy, integrity, and validity. The historical progression demonstrates how the development of symmetric key algorithms (like DES, AES) and asymmetric key algorithms (like RSA, ECC)—driven by advances in computing power and the growing complexity of security threats—replaced simpler encryption techniques like substitution ciphers. The drawbacks of existing cryptographic systems are discussed, such as processing costs, difficulties managing keys, susceptibility to side-channel attacks, sophisticated computational attacks (such as quantum computing), and implementation errors. It responds by outlining precautionary steps that include using strong algorithms, putting strong key management procedures in place, following best practices in cryptography, and making sure that implementation is secure through code reviews and security assessments.
Title: Cryptographic Algorithms and Protocols: Evolution and Future Trend
Description:
This chapter provides a thorough analysis of cryptographic protocols and algorithms, tracing their development from antiquated to contemporary approaches and predicting emerging developments.
It starts with some basic definitions and emphasizes how cryptography uses mathematical operations to encrypt and decrypt data in order to guarantee data secrecy, integrity, and validity.
The historical progression demonstrates how the development of symmetric key algorithms (like DES, AES) and asymmetric key algorithms (like RSA, ECC)—driven by advances in computing power and the growing complexity of security threats—replaced simpler encryption techniques like substitution ciphers.
The drawbacks of existing cryptographic systems are discussed, such as processing costs, difficulties managing keys, susceptibility to side-channel attacks, sophisticated computational attacks (such as quantum computing), and implementation errors.
It responds by outlining precautionary steps that include using strong algorithms, putting strong key management procedures in place, following best practices in cryptography, and making sure that implementation is secure through code reviews and security assessments.
Related Results
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, wh...
A NEW PROPOSED LIGHTWEIGHT CIPHER
A NEW PROPOSED LIGHTWEIGHT CIPHER
Modern cryptography algorithm development has favored hardware optimization in computer systems. This is especially important for fitting cryptographic protocols onto devices with ...
Impact of imperfections on correlation-based quantum information protocols
Impact of imperfections on correlation-based quantum information protocols
Quantum information science is a rapidly evolving field both from the theoretical and the experimental viewpoint, motivated by the fact that protocols exploiting quantum resources ...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...
Factorial number system for nonlinear substitutions generation
Factorial number system for nonlinear substitutions generation
Modern cryptographic applications use cryptographic algorithms with a symmetric key. They provide high conversion rates and resistance to crypto-graphic attacks. To complicate the ...
Exploring Privacy in Location-based Services Using Cryptographic Protocols
Exploring Privacy in Location-based Services Using Cryptographic Protocols
Location-based services (LBS) are available on a variety of mobile platforms like cell phones, PDA's, etc. and an increasing number of users subscribe to and use these services. Tw...
Evolution of Cryptographic Algorithms and Performance Parameters
Evolution of Cryptographic Algorithms and Performance Parameters
Internet and networks applications are growing very fast. Most of confidential data is circulated through networks as electronic data for achieving faster communication. In data co...

