Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Computer Sciences

The Mceliece Cryptosystem As A Solution To The Post-Quantum Cryptographic Problem, Isaac Hanna Jan 2023

The Mceliece Cryptosystem As A Solution To The Post-Quantum Cryptographic Problem, Isaac Hanna

Senior Honors Theses

The ability to communicate securely across the internet is owing to the security of the RSA cryptosystem, among others. This cryptosystem relies on the difficulty of integer factorization to provide secure communication. Peter Shor’s quantum integer factorization algorithm threatens to upend this. A special case of the hidden subgroup problem, the algorithm provides an exponential speedup in the integer factorization problem, destroying RSA’s security. Robert McEliece’s cryptosystem has been proposed as an alternative. Based upon binary Goppa codes instead of integer factorization, his cryptosystem uses code scrambling and error introduction to hinder decrypting a message without the private key. This …


A Novel Color Image Encryption Scheme Based On Arnold’S Cat Map And 16-Byte S-Box, Tariq Shah, Ayesha Qureshi, Muhammad Usman Jun 2021

A Novel Color Image Encryption Scheme Based On Arnold’S Cat Map And 16-Byte S-Box, Tariq Shah, Ayesha Qureshi, Muhammad Usman

Applications and Applied Mathematics: An International Journal (AAM)

The presented work sets out to subsidize to the general body of knowledge in the field of cryptography application by evolving color image encryption and decryption scheme based on the amalgamation of pixel shuffling and efficient substitution. Arnold’s cat map is applied to snap off the correlation in pixels of image and the shuffled image is encrypted by 16-byte S-box substitution. Computer simulations with a standard test image and the outcome is presented to scrutinize the competence of the projected system. Several image-quality measures and security analyses have been made out for the encrypted image to estimate the statistical and …


Universal Quantum Computation, Junya Kasahara Jan 2019

Universal Quantum Computation, Junya Kasahara

Theses, Dissertations and Capstones

We study quantum computers and their impact on computability. First, we summarize the history of computer science. Only a few articles have determined the direction of computer science and industry despite the fact that many works have been dedicated to the present success. We choose articles by A. M. Turing and D. Deutsch, because A. M. Turing proposed the basic architecture of modern computers while D. Deutsch proposed an architecture for the next generation of computers called quantum computers. Second, we study the architecture of modern computers using Turing machines. The Turing machine has the basic design of modern computers …


Cayley Graphs Of Semigroups And Applications To Hashing, Bianca Sosnovski Jun 2016

Cayley Graphs Of Semigroups And Applications To Hashing, Bianca Sosnovski

Dissertations, Theses, and Capstone Projects

In 1994, Tillich and Zemor proposed a scheme for a family of hash functions that uses products of matrices in groups of the form $SL_2(F_{2^n})$. In 2009, Grassl et al. developed an attack to obtain collisions for palindromic bit strings by exploring a connection between the Tillich-Zemor functions and maximal length chains in the Euclidean algorithm for polynomials over $F_2$.

In this work, we present a new proposal for hash functions based on Cayley graphs of semigroups. In our proposed hash function, the noncommutative semigroup of linear functions under composition is considered as platform for the scheme. We will also …


Color Image Encryption And Decryption Using Hill Cipher Associated With Arnold Transform, Rakesh Ranjan, R. K. Sharma, M. Hanmandlu Jun 2016

Color Image Encryption And Decryption Using Hill Cipher Associated With Arnold Transform, Rakesh Ranjan, R. K. Sharma, M. Hanmandlu

Applications and Applied Mathematics: An International Journal (AAM)

Image security over open network transmission is a big concern nowadays. This paper proposes another methodology for color image encoding and decoding using two stage Hill Cipher method which is connected with Arnold Transformation. The forgoing created a strategy for encryption and decryption of color image information and touched on just the premise of keys. In this plan, keys and the agreement of Hill Cipher (HC) are basic. Moreover, keys multiplication (pre or post) over an RGB image information framework is inevitable to know to effectively decrypt the first image information. We have given a machine simulation with a standard …


Grayscale-Image Encryption Using Random Hill Cipher Over Sln(F) Associated With Discrete Wavelet Transformation, D. C. Mishra, R. K. R. K. Sharma Dec 2013

Grayscale-Image Encryption Using Random Hill Cipher Over Sln(F) Associated With Discrete Wavelet Transformation, D. C. Mishra, R. K. R. K. Sharma

Applications and Applied Mathematics: An International Journal (AAM)

Image data are highly sensitive and prone to incidental decoding by intruders. The security of image data in an insecure network is therefore a major issue. In this paper, we have presented a novel approach for grayscale-image encryption and decryption using Random Hill cipher over SLn(F) associated with discrete wavelet transformation. Earlier techniques for encryption and decryption of image data discussed missing the keys, but in this approach, both the keys and the arrangement of RHC are emphasized. Additionally, keys multiplication side (pre or post) over a grayscale-image data matrix also inevitable to know, to correctly decrypt the encrypted image …


Cryptography Using Steganography: New Algorithms And Applications, Jonathan Blackledge Jan 2011

Cryptography Using Steganography: New Algorithms And Applications, Jonathan Blackledge

Articles

Developing methods for ensuring the secure exchange of information is one of the oldest occupations in history. With the revolution in Information Technology, the need for securing information and the variety of methods that have been developed to do it has expanded rapidly. Much of the technology that forms the basis for many of the techniques used today was originally conceived for use in military communications and has since found a place in a wide range of industrial and commercial sectors. This has led to the development of certain industry standards that are compounded in specific data processing algorithms together …