Suchergebnisse
Filter
1244 Ergebnisse
Sortierung:
Military Cryptography
In: Journal of the Royal United Service Institution, Band 56, Heft 417, S. 1568-1568
ISSN: 1744-0378
A Study In Cryptography
Cryptography is the study and practice of techniques used to secure communications between parties and avoid being looked upon by third party. Generally speaking, cryptography constructs and analyzes protocols that prevent any third party of having access to private data that might concern individuals or government bodies, and it is applied to information security to ensure data confidentiality, data integrity, authentication and non-repudiation. Modern cryptography relies heavily on advanced mathematics, computer science, physics, electrical engineering, and communications science.
BASE
Military Cryptography
In: Journal of the Royal United Service Institution, Band 55, Heft 404, S. 1321-1332
ISSN: 1744-0378
Cryptography in Cloud Computing
Cryptography is a key element in establishing trust and enabling services in the digital world. It is represented in a ways that are not accessible to human users. Hence, humans are left out the trust and security in the digital world. Cryptography is necessary in modern communication protocols and to many digital services. A primitive or protocol should be defined to reach the security goal. Beside the introduction part this paper represents the types of cryptography, algorithm of cryptography and techniques of cryptography and the interaction between Government and cryptography.
BASE
Neural cryptography
In: Vojnotehnicki glasnik, Band 64, Heft 2, S. 483-495
SSRN
Cryptography and sovereignty
In: Survival: global politics and strategy, Band 58, Heft 5, S. 95-122
ISSN: 0039-6338
Encryption's new normal is changing the way in which states assert their sovereignty at home and abroad. Cryptography has gone mainstream. Now more than ever, encryption is used by ordinary citizens, often without their knowledge, and is a subject of national debate. Intelligence and law-enforcement officials warn of the dangers of messages they cannot read. Presidents and prime ministers weigh in on the way cryptography shapes the balance between liberty and security. The Edward Snowden revelations drive encryption-related coverage in major newspapers, even as the technology is rolled out by increasing numbers of companies over government objections. All told, it may be the most international attention a mathematical concept has received since the space race. These ongoing debates exist at the intersection of at least three fields: law, applied mathematics and international relations. The legal debate varies by country, and centres on what restrictions on cryptography the government may enact under each state's domestic political system. The debate in applied maths, drawing on computer science and software engineering, addresses whether or not it is technically feasible to place limitations on cryptographic implementations, such as those desired by some governments, without sacrificing security or the right to privacy. The international-relations debate, which is only nascent, questions what the widespread use of cryptography means for the future of states in the international system. For all the recent discussion and increasing use of cryptography, however, many of the core concepts of the modern debate are not entirely new. In legal and applied-maths circles, similar debates took place in the 1980s, as powerful new forms of encryption came to the fore. Another round of discussion took place in the 1990s, as the spread of the internet dramatically increased the number of encryption users and raised the prospect that the security and privacy offered by cryptography would spread beyond American borders. Much can be learned from these previous debates that can help to ascertain the implications of cryptography for international relations. In several important respects, the increasing implementation of secure cryptographic systems reshapes the concept of state sovereignty. It is clear that the seemingly irreversible rise of strong encryption will place particular types of communication beyond the state's reach, while at the same time leaving policymakers with alternative means of reasserting state power. In this way, encryption is similar to other potential challenges to sovereignty, such as globalisation. In practice, the widespread use of cryptography alters how states relate to one another, and to their own citizens. It raises important questions about the legitimate use of a state's own power, and the ways in which this power is constrained by the power of other states. (Survival / SWP)
World Affairs Online
NETWORK SECURITY IN CRYPTOGRAPHY
Association Security and Cryptography is a plan to guarantee association and data transmission over far off association. Data Security is the central piece of secure data transmission over sensitive association. Association security remembers the endorsement of permission to data for an association, which is obliged by the association executive. Customers pick or are consigned an ID and mystery state or other affirming information that grants them induction to information and ventures inside their capacity. Association security covers an arrangement of PC associations, both public and private, that are used in customary positions driving trades and exchanges among associations, government workplaces and individuals. Associations can be private, for instance, inside an association, and others which might be accessible to network. Association security is locked in with affiliations, adventures, and various kinds of establishments. Aggravation receptive association (DTN) progressions are getting victorious plans that award center points to talk with each other in these absurd frameworks organization conditions. Consistently, when there is no restriction to-end relationship between a source and a goal pair, the messages from the source center point may require keeping things under control in the center points for a lot of time impending the affiliation would be in the end set up. The possibility of value based encryption (ABE) is a capable technique that fulfills the requirements for secure data recuperation in DTNs. Especially, Cipher text-Policy ABE (CP-ABE) gives a versatile technique for encoding data with the ultimate objective that the scramble or portrays the property set that the unscramble or needs to need to translate the code text. Thusly, divergent customers are allowable to unscramble different pieces of data per the security system.
BASE
Cryptography and Sovereignty
In: Survival: global politics and strategy, Band 58, Heft 5, S. 95-122
ISSN: 1468-2699
Cryptography in the enterprise
In: Infosecurity, Band 4, Heft 1, S. 18-22
ISSN: 1754-4548
Cryptography with Disposable Backdoors
In: Cryptography ; Volume 3 ; Issue 3
Backdooring cryptographic algorithms is an indisputable taboo in the cryptographic literature for a good reason: however noble the intentions, backdoors might fall in the wrong hands, in which case security is completely compromised. Nonetheless, more and more legislative pressure is being produced to enforce the use of such backdoors. In this work we introduce the concept of disposable cryptographic backdoors which can be used only once and become useless after that. These exotic primitives are impossible in the classical digital world without stateful and secure trusted hardware support, but, as we show, are feasible assuming quantum computation and access to classical stateless hardware tokens. Concretely, we construct a disposable (single-use) version of message authentication codes, and use them to derive a black-box construction of stateful hardware tokens in the above setting with quantum computation and classical stateless hardware tokens. This can be viewed as a generic transformation from stateful to stateless tokens and enables, among other things, one-time programs and memories. This is to our knowledge the first provably secure construction of such primitives from stateless tokens. As an application of disposable cryptographic backdoors we use our constructed primitive above to propose a middle-ground solution to the recent legislative push to backdoor cryptography: the conflict between Apple and FBI. We show that it is possible for Apple to create a one-time backdoor which unlocks any single device, and not even Apple can use it to unlock more than one, i.e., the backdoor becomes useless after it is used. We further describe how to use our ideas to derive a version of CCA-secure public key encryption, which is accompanied with a disposable (i.e., single-use, as in the above scenario) backdoor.
BASE
Skepticism and Cryptography
In: Knowledge, technology and policy: an international quarterly, Band 20, Heft 4, S. 231-242
ISSN: 1874-6314