Classification of Cryptography

Classification of Cryptography

Source publication
Preprint
Full-text available
With the emergence of 5G, Internet of Things (IoT) will become a centre of attraction for almost all industries due to its wide range of applications from various domains. The explosive growth of industrial control processes and the industrial IoT, imposes unprecedented vulnerability to cyber threats in critical infrastructure through the interconn...

Context in source publication

Context 1
... code size is the size of the executable code in KB. Cryptography can be classified into two main branches, symmetric cipher and asymmetric cipher (Figure 2). Symmetric cipher uses single key for both encryption and decryption of the data, whereas asymmetric cipher uses two keys, public key for encryption and private key for decryption [44]. ...

Similar publications

Article
Full-text available
Data encryption which is associated with cryptography is necessary to prevent the compromise of Personally Identifying. Multi-level security is ensured by combining the Huffman code with certain cryptographic techniques, such as symmetric encryption algorithms. In order to decode the message, Huffman code can access both the code wordlist and the e...
Article
Full-text available
Forward privacy of RFID systems and its relaxed version, narrow forward privacy, are generally considered satisfactory for practical needs. Unfortunately, the attempt to get forward privacy by symmetric-key cryptography failed. Also, all symmetric-key cryptography-based RFID systems proposed so far that are strictly narrow forward private (that is,...
Article
Full-text available
Fraud and counterfeiting have caused various inconveniences to manufacturers and the product consumer market. To avoid counterfeiting and, therefore, bring a higher level of trust and security in commercial transactions, several authentication techniques for physical products have been proposed. Among the techniques commonly employed, the most popu...
Chapter
Full-text available
The last decade has shown an increasing interest in the use of the physically unclonable function (PUF) technology in the design of radio frequency identification (RFID) systems. PUFs can bring extra security and privacy at the physical level that cannot be obtained by symmetric or asymmetric cryptography at the moment. However, many PUF-based RFID...
Article
Full-text available
Hardware security modules play a crucial role in protecting and preserving technologically integrated systems that are used in daily life. They employ cryptographic protocols to secure a system against adversaries. Generally, cryptographic algorithms and security keys are quintessential for maintaining the security of a system. Cryptography uses a...