Annotated bibliography

Source A

Citation

Chouksey, S., Agrawal, R., Verma, D., & Metta, T. (2013). Data Authentication Using Cryptography. International Journal of Advanced Computer Research, 3(10), 183–186.

Description

In this paper data authentication problems and solutions has discussed. Possible adjustments from tampering and localizing tampering are provided as the challenges faced in data authentication of cryptography and as the solution cryptography source coding and statistical methods are used.

Source B

Citation

Coppersmith, D. (2000). Cryptography. IBM Journal of Research and Development, 44(1), 246-250. Retrieved from https://ezproxy.csu.edu.au/login?url=https://search-proquest-com.ezproxy.csu.edu.au/docview/220681265?accountid=10344

Description

The paper is all about two main aspects used in cryptography which is a Data Encryption Standard (DES) and Diffie-Hellman Key exchange protocol. These two methods use a private key and public key systems respectively. The author defines the cryptography as an art of secret writing and cryptoanalysis as the art of breaking it.

Source C

Citation

Dent, A.W.(2020). Choosing Key sizes for cryptography. Information Security Technical report. Retrieved from  https://doi.org/10.1016/j.istr.2010.10.006

Description

In the use of Public Key cryptography, one has to decide the length of the key. According to the author, this is one of the challenges in cryptography and therefore this article has investigated the standards for choosing the key length.

Source D

Citation

Fernández, R. S., Sentí, V. E., & Heredia, Y. H. (2016). Cryptographic schemes for minutiae template protection. International Journal of Innovation and Applied Studies, 14(4), 997-1004. Retrieved from https://ezproxy.csu.edu.au/login?url=https://search-proquest-com.ezproxy.csu.edu.au/docview/1757731535?accountid=10344

Description

One of the most interesting areas of cryptography is discussed in this article, which is the usage of biometrics, especially fingerprint recognition. But according to the authors, there are many different methods have proposed up to now but unfortunately, most of them have not succeeded completely. Therefore this can lead to the misconduct of data as it is not secured enough. The authors suggest that if an efficient biometric data protection process to be carried out there should be three main requirements to be fulfilled: Cryptographic security, Revocability, and performance.

Finally, they propose a new schema for fingerprint detection with high security called a fingerprint minutiae template protection scheme.

Source E

Citation

Kapoor, B., Pandya, P., & Sherif, J. S. (2011). Cryptography. Kybernetes, 40(9), 1422-1439. doi:http://dx.doi.org.ezproxy.csu.edu.au/10.1108/03684921111169468

Description

The main purpose of this article is to focus on the awareness of data security in network-based attacks. According to the author nowadays the internet is one of the highly used platforms in e-commerce and a threat of disclosure of privacy or confidentiality also parallelly increased. Therefore the use of cryptography is essential in terms of maintaining the seven pillars of security namely Authentication, Authorization, Privacy, Integrity, non- repudiation, Availability, and audit.

Further, in this article author has well explained many algorithms use in cryptography. Euclidean Algorithm and ciphers relate with this such as Substitution cipher, Transposition Cipher, Symmetric cipher, product ciphers, Algebraic structure, block ciphers, etc.

Source F

Citation

Kiraz, M.S. A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. J Ambient Intell Human Comput 7, 731–760 (2016). https://doi-org.ezproxy.csu.edu.au/10.1007/s12652-016-0385-0

Description

The research area of this article is focused on the dilemma of cryptography in cloud computing. According to the author the cloud is mainly developed for the purpose of economic benefits. But the user’s data will be revealed to the cloud and it is a security and privacy concern for the owner. Also, the researcher points out that modern cryptography is more developed recently compared to classical cryptography. In this article, the dilemmas in the cloud and the solutions for them in both modern and classical cryptography is discussed.

Source G

Citation

Latifa, e., my ahemed, e. k., Mohamed, e. g., & Omar, a. (2017). blockchain: bitcoin wallet cryptography security, challenges and countermeasures. journal of internet banking and commerce, 22(3), 1-29. retrieved from https://ezproxy.csu.edu.au/login?url=https://search-proquest-com.ezproxy.csu.edu.au/docview/1992203656?accountid=10344

Description

This article describes the security of Bitcoin and peer-to-peer cryptographic currencies. According to the writer Bitcoin is highly built with cryptography knowledge and thus the bitcoin can be directly affected in a situation of an algorithm failure of cryptography. At the same time the writer points out that even the cryptography behind the bitcoin is not broken also still there is a chance of system failure.

Source H

Citation

Masoumi, M., Shi, W. & Xu, L. Nanoscale cryptography: opportunities and challenges. Nano Convergence 2, 21 (2015). https://doi.org/10.1186/s40580-015-0052-8

Description

By following the ideas of the author an emerging technology should be used to improve the performance of integrated circuits. Further, he describes the nanoelectronics as an important and recent technology used in engineering. In this article it is discussed how the nanotechnology contributes to the cryptographic hardware and illustrated how the nanoscale devices can be used in constructing security primitives.

Source I

Citation

Peng, W., ⨯, D. C., & Cheng, S. (2018). One-time-pad cryptography scheme based on a three-dimensional DNA self-assembly pyramid structure. PLoS One, 13(11) doi:http://dx.doi.org.ezproxy.csu.edu.au/10.1371/journal.pone.0206612

Description

In classical cryptography one-time pad encryption is one of the most popular encryption systems. But according to the authors of this article the security of the data is totally depends on the secret key and it is not easy to generate a truly random key which is at least long as the plain text. Therefore the researchers have moved to another emerging way of encryption and decryption instead of generating this random key.

They called it as a calculator which is operate four main operations (AND, OR, NOT, XOR) and named it as three-dimensional DNA self-assembly pyramid structure.

 

Source J

Citation

Rahman, S., Hossain, M., Mouftah, H., El Saddik, A., & Okamoto, E. (2012). Chaos-cryptography based privacy preservation technique for video surveillance. Multimedia Systems, 18(2), 145–155. https://doi-org.ezproxy.csu.edu.au/10.1007/s00530-011-0246-9

Description

A video surveillance system is a very common thing nowadays, but it has no feature for filtering or protecting the privacy-sensitive data such as the face. The goal of this research is to minimize or hide the privacy-sensitive parameters captured in video surveillance. Thus, the researchers had proposed a chaos cryptography method for getting the job done.

Source K

Citation

Yap, W.-S., Phan, R., & Goi, B.-M. (2016). Cryptanalysis of a High-Definition Image Encryption Based on AES Modification. Wireless Personal Communications, 88(3), 685–699. https://doi-org.ezproxy.csu.edu.au/10.1007/s11277-016-3192-1

 

Description

One another most recent issue in transmitting data in the internet is discussed in this paper. The author described that when sending high-resolution images via the internet there is a chance of easily disclosed by unauthorized parties. Therefore, in order to protect the confidentiality of the image the neediness of a secured encryption method is illustrated in this paper.  Chaotic cryptography and block cipher mode are two ongoing methods used to realize the images. But in this article, it is proposed a scheme called modified 128-bit AES cipher as an alternative to overcome the insecure transmitting of high-quality images.

Source L

Citation

Zadiraka, V. K., & Kudin, A. M. (2013). Cloud computing in cryptography and steganography. Cybernetics and Systems Analysis, 49(4), 584-588. doi:http://dx.doi.org.ezproxy.csu.edu.au/10.1007/s10559-013-9544-x

Description

“Light Weight (low resources) cryptography” in cloud computing systems is illustrated in this paper as one of the problems of cryptography in cloud computing systems. Scenarios in cloud computing technology and the cryptographic problems relate to that are discussed in this paper describing service models such as Paas, Saas, and Iaas. Secondly, solutions for the problems have been discussed. Finally, application technologies are discussed in detail.

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *