A new Polynomial based Symmetric Key Algorithm using Polynomial Interpolation Methods

The main attributes of a security framework are Confidentiality, Authentication, and Data integrity. There are two main standards of cryptography algorithms categorized as private or symmetric and public or asymmetric algorithms, symmetric algorithms use one secret key to encrypt and decrypt payload...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Proceedings (International Conference on Communication Systems and Network Technologies Online) S. 675 - 681
Hauptverfasser: Hasija, Taniya, Ramkumar, K. R., Singh, Bhupendra, Kaur, Amanpreet, Mittal, Sudesh Kumar
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: IEEE 08.04.2023
Schlagworte:
ISSN:2473-5655
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract The main attributes of a security framework are Confidentiality, Authentication, and Data integrity. There are two main standards of cryptography algorithms categorized as private or symmetric and public or asymmetric algorithms, symmetric algorithms use one secret key to encrypt and decrypt payloads, the list includes Data Encryption Standard (DES), Advanced Encryption Standard (AES), RC5, Blowfish, and others, and asymmetric algorithms use key pairs consists of public and private keys, RSA, and Elliptic Curve Cryptography are two best examples of the same. In spite of their successful implementations, these standards suffer from various attacks, and the beginning of large-scale quantum is the biggest threat to the commonly used cryptography algorithms. In general, Public-key cryptography relies upon mathematical problems that are hard to be broken with the available computational power but it is believed that quantum computers can break them at polynomial solvable time in future. Quantum-safe cryptography refers to a new generation of algorithms that are resilient against attacks launched by both classical and quantum computers. This work designs and implements a novel cryptography standard using polynomial interpolations to make it both supercomputer and quantum safe.
AbstractList The main attributes of a security framework are Confidentiality, Authentication, and Data integrity. There are two main standards of cryptography algorithms categorized as private or symmetric and public or asymmetric algorithms, symmetric algorithms use one secret key to encrypt and decrypt payloads, the list includes Data Encryption Standard (DES), Advanced Encryption Standard (AES), RC5, Blowfish, and others, and asymmetric algorithms use key pairs consists of public and private keys, RSA, and Elliptic Curve Cryptography are two best examples of the same. In spite of their successful implementations, these standards suffer from various attacks, and the beginning of large-scale quantum is the biggest threat to the commonly used cryptography algorithms. In general, Public-key cryptography relies upon mathematical problems that are hard to be broken with the available computational power but it is believed that quantum computers can break them at polynomial solvable time in future. Quantum-safe cryptography refers to a new generation of algorithms that are resilient against attacks launched by both classical and quantum computers. This work designs and implements a novel cryptography standard using polynomial interpolations to make it both supercomputer and quantum safe.
Author Ramkumar, K. R.
Singh, Bhupendra
Hasija, Taniya
Kaur, Amanpreet
Mittal, Sudesh Kumar
Author_xml – sequence: 1
  givenname: Taniya
  surname: Hasija
  fullname: Hasija, Taniya
  email: taniya@chitkara.edu.in
  organization: Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India
– sequence: 2
  givenname: K. R.
  surname: Ramkumar
  fullname: Ramkumar, K. R.
  email: k.ramkumar@chitkara.edu.in
  organization: Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India
– sequence: 3
  givenname: Bhupendra
  surname: Singh
  fullname: Singh, Bhupendra
  email: bhupendra.cair@gov.in
  organization: Defence Research and Development Organisation,Centre for Artificial Intelligence & Robotics,Bangalore,India
– sequence: 4
  givenname: Amanpreet
  surname: Kaur
  fullname: Kaur, Amanpreet
  email: amanpreet.kaur@chitkara.edu.in
  organization: Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India
– sequence: 5
  givenname: Sudesh Kumar
  surname: Mittal
  fullname: Mittal, Sudesh Kumar
  email: sudesh.mittal@chitkara.edu.in
  organization: Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India
BookMark eNpNkF1LwzAUhqMoOGf_gWD-QGdOkp40l2P4MZwfsO16pO3pFmmT0Vak_15BBa9eHnh4Lt5LdhZiIMZuQMwAhL1drF82mQGJMymkmoEApTHHE5ZYkwNiplEimFM2kdqoNMMsu2BJ378LIZQEQCsnbDvngT75W2zGEFvvGl64niq-HtuWhs6X_IlGPm_2sfPDoeUfvQ_7__oyDNQdY-MGHwN_puEQq_6Kndeu6Sn53Snb3t9tFo_p6vVhuZivUg9gh9TUVgkqNBopqyKXptQkcmeRKixV5b5BW5VrrEBbg3lZkDZ1YQqriYTO1JRd_3Q9Ee2OnW9dN-7-nlBf8ypVTQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CSNT57126.2023.10134686
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781665462617
1665462612
EISSN 2473-5655
EndPage 681
ExternalDocumentID 10134686
Genre orig-research
GroupedDBID 6IE
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i119t-7f930eb46722db827c4e08a96ed6c3dae08493846d149768cbe47fb7b94ee0453
IEDL.DBID RIE
IngestDate Wed Aug 27 02:18:19 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-7f930eb46722db827c4e08a96ed6c3dae08493846d149768cbe47fb7b94ee0453
PageCount 7
ParticipantIDs ieee_primary_10134686
PublicationCentury 2000
PublicationDate 2023-April-8
PublicationDateYYYYMMDD 2023-04-08
PublicationDate_xml – month: 04
  year: 2023
  text: 2023-April-8
  day: 08
PublicationDecade 2020
PublicationTitle Proceedings (International Conference on Communication Systems and Network Technologies Online)
PublicationTitleAbbrev CSNT
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003211692
Score 1.8777292
Snippet The main attributes of a security framework are Confidentiality, Authentication, and Data integrity. There are two main standards of cryptography algorithms...
SourceID ieee
SourceType Publisher
StartPage 675
SubjectTerms Authentication
Banking
Communication systems
Data integrity
Economy
Elliptic curve cryptography
Enterprises
Interpolation
Newton Raphson
Polynomial Interpolation
Post Quantum Cryptography
Quantum computing
Secant Method
Supercomputers
Title A new Polynomial based Symmetric Key Algorithm using Polynomial Interpolation Methods
URI https://ieeexplore.ieee.org/document/10134686
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LawIxEA6t9NBe-rL0TQ69rnWTmMdRpFIoFUEFb7JJJlZQt-ha8N83yaq1hx56S0ICIUMyM8n35UPoyVEJyhKeZMqwhDWkSjLHbWK1y7y_YsxlLopNiE5HDoequyGrRy4MAETwGdRCMb7l29yswlWZ3-EpZVzyQ3QoBC_JWrsLFepTGa7IBsOV1tVzq9fpN0RKAhKB0Np29C8dlehG2qf_nMAZqv4Q8nB352rO0QHML9DJ3l-Cl2jQxD5Cxt18ug5M42yKg4OyuLeezYJqlsFvsMbN6ThfTIqPGQ6A9_F-9xJ-mJfYOPwelaWXVTRov_Rbr8lGMyGZpKkqEuEUrYP2xx8hVksiDIO6zBQHyw21ma8wRX3QYX1q5FMNo4EJp4VWDMCHd_QKVeb5HK4RbhDLHQUiuc-ZhHaa20wbSbn2YQ0T5gZVwwqNPstvMUbbxbn9o_0OHQc7RNiLvEeVYrGCB3RkvorJcvEYjfkNonahHA
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LbgIhFCWtbdJ205dN32XR7VgHkIGlMTU2PmKiJu4MT2uiTqNjE_--gGNrF110BwQSwg3ce-EcDgDPFjPDNaKR4IpEpMJ4JCzVkZZWOH9FiBU2iE0knQ4bDnk3J6sHLowxJoDPTMkXw1u-TtXKX5W5HR5jQhndBwdeOiuna31fqWCXzFCOchRXXOYvtV6nX0li5LEICJe2438pqQRHUj_95xTOQPGHkge7387mHOyZ-QU42flN8BIMqtDFyLCbTteeayym0LsoDXvr2czrZinYNGtYnY7TxSR7n0EPeR_vdt8AENMNOg62g7b0sggG9dd-rRHlqgnRJI55FiWW47KR7gBESEuGEkVMmQlOjaYKa-EqhGMXdmiXHLlkQ0lDEisTyYkxLsDDV6AwT-fmGsAK0tRigxh1WVMiraRaSMUwlS6wIYm6AUW_QqOPzccYo-3i3P7R_gSOGv12a9R66zTvwLG3SQDBsHtQyBYr8wAO1Wc2WS4eg2G_ADcZpGU
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+%28International+Conference+on+Communication+Systems+and+Network+Technologies+Online%29&rft.atitle=A+new+Polynomial+based+Symmetric+Key+Algorithm+using+Polynomial+Interpolation+Methods&rft.au=Hasija%2C+Taniya&rft.au=Ramkumar%2C+K.+R.&rft.au=Singh%2C+Bhupendra&rft.au=Kaur%2C+Amanpreet&rft.date=2023-04-08&rft.pub=IEEE&rft.eissn=2473-5655&rft.spage=675&rft.epage=681&rft_id=info:doi/10.1109%2FCSNT57126.2023.10134686&rft.externalDocID=10134686