Filters








445 Hits in 7.4 sec

An Image Encryption Algorithm Based on Discrete-Time Alternating Quantum Walk and Advanced Encryption Standard

Guangzhe Liu, Wei Li, Xingkui Fan, Zhuang Li, Yuxuan Wang, Hongyang Ma
2022
This paper proposes an image encryption scheme based on a discrete-time alternating quantum walk (AQW) and the advanced encryption standard (AES).  ...  The technology is based on simulation verification, including pixel correlation, histograms, differential attacks, noise attacks, information entropy, key sensitivity, and space.  ...  Based on the original AES algorithm, we combined quantum technology with the AES algorithm and used an alternating quantum walk (AQW) to generate a matrix with quantum properties.  ... 
doi:10.3390/e24050608 pmid:35626493 pmcid:PMC9140423 fatcat:7oifdkhy6zc5bf63iucgdove2u

Will quantum computers be the end of public key encryption?

William Buchanan, Alan Woodward
2016 Journal of Cyber Security Technology  
understood algorithms run in polynomial time on certain quantum computer architectures.  ...  While we know that the well-understood algorithms for factoring large composites and solving the discrete logarithm problem run at best in superpolynomial time on conventional computers, new, less well  ...  Importantly, the NIST review shows that if the key lengths are sufficient, symmetric key encryption (specifically the Advanced Encryption Standard AES) is quantum resistant.  ... 
doi:10.1080/23742917.2016.1226650 fatcat:sfcvw3en6jho3jg5bvt5q2fpri

Post-Quantum Key Exchange Protocols

Xiangdong Li, Lin Leung, Andis Chi-Tung Kwan, Xiaowen Zhang, Dammika Kahanda, Michael Anshel
2006 arXiv   pre-print
In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.  ...  If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today.  ...  Quantum Random Walk We provide the standard notation 38 and model on tree and graph for our discussion.  ... 
arXiv:quant-ph/0603230v2 fatcat:yr6vrd3lhrd57etuvllvfy2zsy

Image Encryption using Fractional Integral transforms: Vulnerabilities, Threats and Future scope [article]

Gurpreet Kaur, Rekha Agarwal, Vinod Patidar
2022 arXiv   pre-print
This paper presents a review on various image encryption schemes based on fractional transforms for security consideration of image communication.  ...  Such a narrative review on encryption algorithm based on various fractional integral transforms in various architectural schematics is not presented before at one place.  ...  Acknowledgements One of us (V.P.) acknowledges the MATRICS Grant (MTR/000203/2018) from SERB, DST, Govt. of India.  ... 
arXiv:2203.02881v1 fatcat:abt35lynvrfbfmqq56fob2slru

Development of Cryptography since Shannon [article]

Funda Özdemir, Çetin Kaya Koç
2022 IACR Cryptology ePrint Archive  
Of the 15 advancing candidates, seven have been selected as finalists and eight as alternate candidates.  ...  standardization process on postquantum cryptography and selected as a third round alternate candidate.  ... 
dblp:journals/iacr/OzdemirK22 fatcat:wzia5wptezdt3guwsic2a4oo6m

Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond [article]

Thomas Attema, Nicole Gervasoni, Michiel Marcus, Gabriele Spini
2021 IACR Cryptology ePrint Archive  
and compute discrete logarithms in polynomial time, thereby breaking systems based on these problems.  ...  based on them), and by presenting the security proofs that are affected by quantum-attackers, detailing what is the current status of research on the topic and what the expected effects on security are  ...  The key exchange protocol, which is based on random walks in an isogeny graph, is an instantiation of the Diffie-Hellman protocol and it goes as follows.  ... 
dblp:journals/iacr/AttemaGMS21 fatcat:emo4s6mhcfaq3g3pk255dyp5fq

Review of Chosen Isogeny-Based Cryptographic Schemes

Bartosz Drzazga, Łukasz Krzywiecki
2022 Cryptography  
However, Shor's algorithm suited for quantum computers can break the bedrock of most currently used systems, i.e., the RSA problem and discrete logarithm problem.  ...  Post-quantum cryptography can withstand attacks carried out by quantum computers. Several families of post-quantum systems exist; one of them is isogeny-based cryptography.  ...  Initiatives such as NIST Post-Quantum Cryptography Competition [3] are an effort to standardize quantum-resistant schemes.  ... 
doi:10.3390/cryptography6020027 fatcat:jfwtotts7vbs3jbjpduz2ylljm

Will the Butterfly Cipher keep your Network Data secure? Developments in Computer Encryption [article]

Vita Hinze-Hoare
2006 arXiv   pre-print
This paper explains the recent developments in security and encryption. The Butterfly cipher and quantum cryptography are reviewed and compared.  ...  In addition application to network security together with a substantial review of classification of encryption systems and a summary of security weaknesses are considered.  ...  Should an unbreakable encryption algorithm be invented then this area would be the first to outlaw it.  ... 
arXiv:cs/0604048v1 fatcat:yvbnijbwcbgqrlkbbh5xu4r2em

A Critical and Moving-Forward View on Quantum Image Processing [article]

Fei Yan, Salvador E. Venegas-Andraca, Kaoru Hirota
2020 arXiv   pre-print
Quantum Image Processing (QIMP) is an emergent field of quantum information science whose main goal is to strengthen our capacity for storing, processing, and retrieving visual information from images  ...  and video either by transitioning from digital to quantum paradigms or by complementing digital imaging with quantum techniques.  ...  Acknowledgements This work was supported by Tecnologico de Monterrey and CONA-CyT (SNI No. 41594, Fronteras Ciencia 1007).  ... 
arXiv:2006.08747v1 fatcat:5bzbxl3usrguxoi3es3natvdgm

SÉTA: Supersingular Encryption from Torsion Attacks [article]

Cyprien Delpech de Saint Guilhem, Péter Kutas, Christophe Petit, Javier Silva
2019 IACR Cryptology ePrint Archive  
We present Séta, 11 a new family of public-key encryption schemes with post-quantum security based on isogenies of supersingular elliptic curves.  ...  given an endomorphism of the starting curve and images of torsion points.  ...  We would like to thank the anonymous reviewers for their remarks and suggestions. Péter Kutas and Christophe Petit's work was supported by EPSRC grant EP/S01361X/1. Péter Kutas was also supported by  ... 
dblp:journals/iacr/GuilhemKPS19 fatcat:mfjxxjuzpvcdrerviwb5tmlq6y

Quantum Computing: A Taxonomy, Systematic Review and Future Directions [article]

Sukhpal Singh Gill, Adarsh Kumar, Harvinder Singh, Manmeet Singh, Kamalpreet Kaur, Muhammad Usman, Rajkumar Buyya
2021 arXiv   pre-print
In recent years, tremendous progress in both quantum hardware development and quantum software/algorithm have brought quantum computing much closer to reality.  ...  Quantum computing is an emerging paradigm with the potential to offer significant computational advantage over conventional classical computing by exploiting quantum-mechanical principles such as entanglement  ...  These algorithms are classified in one of the following categories: quantum Fourier transform, amplitude amplification, quantum walks, Bounded-error Quantum Polynomial time (BQP)-complete, and hybrid quantum  ... 
arXiv:2010.15559v4 fatcat:y6cuttww5fd5jdmvcer352lh4e

Quantum Technology for Military Applications [article]

Michal Krelina
2021 arXiv   pre-print
Quantum technology is an emergent and potentially disruptive discipline, with the ability to affect many human activities.  ...  This report reviews and maps the possible quantum technology military applications, serving as an entry point for international peace and security assessment, ethics research, military and governmental  ...  Acknowledgement The author is very grateful for several comments and feedback on the draft, especially by Dr Katarzyna Kubiak, Dr Jürgen Altmann and others.  ... 
arXiv:2103.12548v2 fatcat:wfoyemxkvzgg5pbt6btzkl4jjy

Quantum technology for military applications

Michal Krelina
2021 EPJ Quantum Technology  
This report reviews and maps the possible quantum technology military applications, serving as an entry point for international peace and security assessment, ethics research, military and governmental  ...  This report provides a basic overview of quantum technologies under development, also estimating the expected time scale of delivery or the utilisation impact.  ...  Acknowledgements The author is very grateful for several comments and feedback on the draft, especially by Dr Katarzyna Kubiak, Dr Jürgen Altmann and others.  ... 
doi:10.1140/epjqt/s40507-021-00113-y fatcat:3nuu3r5jwjaade4ck2srxjaahm

Stochastic Fractal Search Algorithm Improved with Opposition-Based Learning for Solving the Substitution Box Design Problem

Francisco Gonzalez, Ricardo Soto, Broderick Crawford
2022 Mathematics  
We obtained substitution boxes of high nonlinearity in comparison with other works based on metaheuristics and chaotic schemes.  ...  In this work, we implemented a hybrid between the stochastic fractal search algorithm in conjunction with opposition-based learning.  ...  On the other hand, it was proposed an image encryption scheme that is based on the suggested substitution box.  ... 
doi:10.3390/math10132172 fatcat:62q7hs3z75aevipbpjdvsxq3eu

Another Look at Tightness II: Practical Issues in Cryptography [chapter]

Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar
2017 Lecture Notes in Computer Science  
We discuss nontightness in connection with complexity leveraging, HMAC, lattice-based cryptography, identity-based encryption, and hybrid encryption.  ...  Ramanna for providing helpful comments on an earlier draft of §7, Ann Hibner Koblitz for editorial suggestions, and Ian Blake, Eike Kiltz, and Chris Peikert for helpful feedback and suggestions.  ...  Acknowledgments We wish to thank Greg Zaverucha for extensive help with Appendix A as well as useful comments on the other sections, Michael Naehrig for reviewing and commenting on §6, Somindu C.  ... 
doi:10.1007/978-3-319-61273-7_3 fatcat:auyw65hh2rfh3k3hphhrf6mcra
« Previous Showing results 1 — 15 out of 445 results