Cryptography from Quantum Mechanical Viewpoint Minal Lopes and Dr. Nisha Sarwade University School of Information Technology, G G S Indraprastha University, Delhi, INDIA,2 Department of Computer Engineering, Jamia Millia Islamia, Delhi, INDIA ABSTRACT Cryptography is an art and science of secure communication. Here the sender and receiver are guaranteed the security through encryption of their data, with the help of a common key. Both the parties should agree on this key prior to communication. The cryptographic systems which perform these tasks are designed to keep the key secret while assuming that the algorithm used for encryption and decryption is public. Thus key exchange is a very sensitive issue. In modern cryptographic algorithms this security is based on the mathematical complexity of the algorithm. But quantum computation is expected to revolutionize computing paradigm in near future. This presents a challenge amongst the researchers to develop new cryptographictechniques tha...
Posts
Showing posts from November, 2022
- Get link
- X
- Other Apps

Call For Articles..! 12th International Conference on Peer-to-Peer Networks and Trust Management (P2PTM 2022) https://cndc2022.org/p2ptm/index December 23 ~ 24, 2022, Sydney, Australia Submission Deadline: December 03, 2022 Contact Us Here's where you can reach us : p2ptm@cndc2022.org or p2ptmconf@yahoo.com Submission Link: https://cndc2022.org/submission/index.php
- Get link
- X
- Other Apps

Call For Papers...!!! International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Submission System: ijcisjournal@wireilla.com Submission System: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@yahoo.com or ijcisjournal@wireilla.com #researchers #phd #articles #papersubmission #student #researchscholors #ijcis #fuzzysystems #securityengineering #informationsecurity
- Get link
- X
- Other Apps
International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Paper Title A CRITICAL REASSESSMENT OF EVOLUTIONARY ALGORITHMS ON THE CRYPTANALYSIS OF THE SIMPLIFIED DATA ENCRYPTION STANDARD ALGORITHM Authors Fabien Teytau and Cyril Fonlupt Abstract In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm using metaheuristics and in particular genetic algorithms. The classic fitness function when using such an algorithm is to compare n-gram statistics of a the decrypted message with those of the target message. We show that using such a function is irrelevant in case of Genetic Algorithm, simply because there is no correlation between the distance to the real key (the optimum) and the value of the fitness, in other words, there is no hidden gradient. In order to emphasize this assumption we experimentally show that a genetic algorithm perform ...
- Get link
- X
- Other Apps
.png)
Call for papers...!!!! 8th International Conference on Software Security (ICSS 2022) December 23 ~ 24, 2022, Sydney, Australia Webpage URL: https://cndc2022.org/icss/index Submission Deadline: November 26, 2022 Contact us: Here's where you can reach us: icss@cndc2022.org or icssconfe@yahoo.com Submission URL: https://cndc2022.org/submission/index.php
- Get link
- X
- Other Apps
Submit Your Research Article - December 2022 Issue.!!! International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Academia Link : https://www.academia.edu/91337816/November_2022_Top_5_Read_Article_for_Cryptography_and_Information_Security_International_Journal_on_Cryptography_and_Information_Security_IJCIS. Contact Us: ijcisjournal@yahoo.com or ijcisjournal@wireilla.com Submission URL: http://coneco2009.com/submissions/imagination/home.html
- Get link
- X
- Other Apps

#researchers #phd #articles #papersubmission #student #researchscholors #ijcis #FuzzySystems #SecurityEngineering Call For Papers...!!! International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Submission System: ijcisjournal@wireilla.com Submission System: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@yahoo.com or ijcisjournal@wireilla.com Submission Deadline : November 26, 2022
- Get link
- X
- Other Apps
International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Paper Title Data Encryption Using Bio Molecular Information Authors Behnam Bazli, Mustafa Anil Tuncel and David Llewellyn-Jones Abstract Cryptography is a field, which makes the transmitted message unreadable to unauthorised users. In this work we take inspiration from DNA encryption schemes and use of biological alphabets to manipulate information by employing the DNA sequence reaction, to autonomously make a copy of its threads as an extended encryption key. Information is converted from plain text to several formats and then follows the stages of protein formation from DNA sequences to generate an extended key using chemical property and attributes to be used in encryption mechanism. This technique will enhance the security of the encryption mechanism by substitution, manipulation, and complexity. Furthermore this technique can be use...
- Get link
- X
- Other Apps

Call For Papers...!!! International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Submission System: ijcisjournal@wireilla.com Submission System: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@yahoo.com or ijcisjournal@wireilla.com Submission Deadline : November 19, 2022
- Get link
- X
- Other Apps

Call for papers...!!! 12th International Conference on Cryptography and Information Security (CRYPIS 2023) July 29 ~ 30, 2023, London, United Kingdom https://itcse2023.org/crypis/index Submission Deadline: November 12, 2022 Contact us: crypis@itcse2023.org Submission Link: https://itcse2023.org/submission/index.php
- Get link
- X
- Other Apps
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals ============================== International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Submission System: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@yahoo.com or ijcisjournal@wireilla.com ************************************ Current Issue Url : https://wireilla.com/ijcis/vol12.html ============================= Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals Authors Janaki Raman Palaniappan, Software Engineer, USA Abstract Internet hacking has become common now a days and is increasing day by day. It is a high time to safeguard our data. There are several cryptographic methods and algorithms that are evolved and already exist. How about additional protection makes us stress free? In this paper, I present a unique design of cryptographic...
- Get link
- X
- Other Apps
.jpg)
International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Submission System: ijcisjournal@wireilla.com Submission System: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@yahoo.com or ijcisjournal@wireilla.com
- Get link
- X
- Other Apps
International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Paper Title Automatic Tempest Test and Analysis System Design Authors Cihan Ulas, Serhat Sahin, Emir Memisoglu, Ulas Asık, Canturk Karadeniz , Bilal Kılıc , Ugur Sarac Abstract Today, it is clearly known that the electronic devices generate electromagnetic radiations unintentionally, which may contain critical information called compromising emanations (CE). CE is also known as TEMPEST radiation, which is a code name firstly used by an U.S government program. Every developed country has a TEMPEST Test Laboratory (TTL) connected to their National Security Agency (NSA). The main objective of these laboratories is to investigate equipment, systems, and platforms processing cryptographic information in terms of CE. TEMPEST tests might take very long time depending on the item under test. In this paper, a complete Automatic TEMPEST Test ...
- Get link
- X
- Other Apps

Call For Articles..! 12th International Conference on Peer-to-Peer Networks and Trust Management (P2PTM 2022) https://cndc2022.org/p2ptm/index December 23 ~ 24, 2022, Sydney, Australia Submission Deadline: November 05, 2022 Contact Us Here's where you can reach us : p2ptm@cndc2022.org or p2ptmconf@yahoo.com Submission Link: https://cndc2022.org/submission/index.php