A new Polynomial based Symmetric Key Algorithm using Polynomial Interpolation Methods
The main attributes of a security framework are Confidentiality, Authentication, and Data integrity. There are two main standards of cryptography algorithms categorized as private or symmetric and public or asymmetric algorithms, symmetric algorithms use one secret key to encrypt and decrypt payload...
Gespeichert in:
| Veröffentlicht in: | Proceedings (International Conference on Communication Systems and Network Technologies Online) S. 675 - 681 |
|---|---|
| Hauptverfasser: | , , , , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
IEEE
08.04.2023
|
| Schlagworte: | |
| ISSN: | 2473-5655 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The main attributes of a security framework are Confidentiality, Authentication, and Data integrity. There are two main standards of cryptography algorithms categorized as private or symmetric and public or asymmetric algorithms, symmetric algorithms use one secret key to encrypt and decrypt payloads, the list includes Data Encryption Standard (DES), Advanced Encryption Standard (AES), RC5, Blowfish, and others, and asymmetric algorithms use key pairs consists of public and private keys, RSA, and Elliptic Curve Cryptography are two best examples of the same. In spite of their successful implementations, these standards suffer from various attacks, and the beginning of large-scale quantum is the biggest threat to the commonly used cryptography algorithms. In general, Public-key cryptography relies upon mathematical problems that are hard to be broken with the available computational power but it is believed that quantum computers can break them at polynomial solvable time in future. Quantum-safe cryptography refers to a new generation of algorithms that are resilient against attacks launched by both classical and quantum computers. This work designs and implements a novel cryptography standard using polynomial interpolations to make it both supercomputer and quantum safe. |
|---|---|
| AbstractList | The main attributes of a security framework are Confidentiality, Authentication, and Data integrity. There are two main standards of cryptography algorithms categorized as private or symmetric and public or asymmetric algorithms, symmetric algorithms use one secret key to encrypt and decrypt payloads, the list includes Data Encryption Standard (DES), Advanced Encryption Standard (AES), RC5, Blowfish, and others, and asymmetric algorithms use key pairs consists of public and private keys, RSA, and Elliptic Curve Cryptography are two best examples of the same. In spite of their successful implementations, these standards suffer from various attacks, and the beginning of large-scale quantum is the biggest threat to the commonly used cryptography algorithms. In general, Public-key cryptography relies upon mathematical problems that are hard to be broken with the available computational power but it is believed that quantum computers can break them at polynomial solvable time in future. Quantum-safe cryptography refers to a new generation of algorithms that are resilient against attacks launched by both classical and quantum computers. This work designs and implements a novel cryptography standard using polynomial interpolations to make it both supercomputer and quantum safe. |
| Author | Ramkumar, K. R. Singh, Bhupendra Hasija, Taniya Kaur, Amanpreet Mittal, Sudesh Kumar |
| Author_xml | – sequence: 1 givenname: Taniya surname: Hasija fullname: Hasija, Taniya email: taniya@chitkara.edu.in organization: Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India – sequence: 2 givenname: K. R. surname: Ramkumar fullname: Ramkumar, K. R. email: k.ramkumar@chitkara.edu.in organization: Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India – sequence: 3 givenname: Bhupendra surname: Singh fullname: Singh, Bhupendra email: bhupendra.cair@gov.in organization: Defence Research and Development Organisation,Centre for Artificial Intelligence & Robotics,Bangalore,India – sequence: 4 givenname: Amanpreet surname: Kaur fullname: Kaur, Amanpreet email: amanpreet.kaur@chitkara.edu.in organization: Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India – sequence: 5 givenname: Sudesh Kumar surname: Mittal fullname: Mittal, Sudesh Kumar email: sudesh.mittal@chitkara.edu.in organization: Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India |
| BookMark | eNpNkF1LwzAUhqMoOGf_gWD-QGdOkp40l2P4MZwfsO16pO3pFmmT0Vak_15BBa9eHnh4Lt5LdhZiIMZuQMwAhL1drF82mQGJMymkmoEApTHHE5ZYkwNiplEimFM2kdqoNMMsu2BJ378LIZQEQCsnbDvngT75W2zGEFvvGl64niq-HtuWhs6X_IlGPm_2sfPDoeUfvQ_7__oyDNQdY-MGHwN_puEQq_6Kndeu6Sn53Snb3t9tFo_p6vVhuZivUg9gh9TUVgkqNBopqyKXptQkcmeRKixV5b5BW5VrrEBbg3lZkDZ1YQqriYTO1JRd_3Q9Ee2OnW9dN-7-nlBf8ypVTQ |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/CSNT57126.2023.10134686 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781665462617 1665462612 |
| EISSN | 2473-5655 |
| EndPage | 681 |
| ExternalDocumentID | 10134686 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
| ID | FETCH-LOGICAL-i119t-7f930eb46722db827c4e08a96ed6c3dae08493846d149768cbe47fb7b94ee0453 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 02:18:19 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i119t-7f930eb46722db827c4e08a96ed6c3dae08493846d149768cbe47fb7b94ee0453 |
| PageCount | 7 |
| ParticipantIDs | ieee_primary_10134686 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-April-8 |
| PublicationDateYYYYMMDD | 2023-04-08 |
| PublicationDate_xml | – month: 04 year: 2023 text: 2023-April-8 day: 08 |
| PublicationDecade | 2020 |
| PublicationTitle | Proceedings (International Conference on Communication Systems and Network Technologies Online) |
| PublicationTitleAbbrev | CSNT |
| PublicationYear | 2023 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0003211692 |
| Score | 1.8777292 |
| Snippet | The main attributes of a security framework are Confidentiality, Authentication, and Data integrity. There are two main standards of cryptography algorithms... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 675 |
| SubjectTerms | Authentication Banking Communication systems Data integrity Economy Elliptic curve cryptography Enterprises Interpolation Newton Raphson Polynomial Interpolation Post Quantum Cryptography Quantum computing Secant Method Supercomputers |
| Title | A new Polynomial based Symmetric Key Algorithm using Polynomial Interpolation Methods |
| URI | https://ieeexplore.ieee.org/document/10134686 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LawIxEA6t9NBe-rL0TQ69rnWTmMdRpFIoFUEFb7JJJlZQt-ha8N83yaq1hx56S0ICIUMyM8n35UPoyVEJyhKeZMqwhDWkSjLHbWK1y7y_YsxlLopNiE5HDoequyGrRy4MAETwGdRCMb7l29yswlWZ3-EpZVzyQ3QoBC_JWrsLFepTGa7IBsOV1tVzq9fpN0RKAhKB0Np29C8dlehG2qf_nMAZqv4Q8nB352rO0QHML9DJ3l-Cl2jQxD5Cxt18ug5M42yKg4OyuLeezYJqlsFvsMbN6ThfTIqPGQ6A9_F-9xJ-mJfYOPwelaWXVTRov_Rbr8lGMyGZpKkqEuEUrYP2xx8hVksiDIO6zBQHyw21ma8wRX3QYX1q5FMNo4EJp4VWDMCHd_QKVeb5HK4RbhDLHQUiuc-ZhHaa20wbSbn2YQ0T5gZVwwqNPstvMUbbxbn9o_0OHQc7RNiLvEeVYrGCB3RkvorJcvEYjfkNonahHA |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LbgIhFCWtbdJ205dN32XR7VgHkIGlMTU2PmKiJu4MT2uiTqNjE_--gGNrF110BwQSwg3ce-EcDgDPFjPDNaKR4IpEpMJ4JCzVkZZWOH9FiBU2iE0knQ4bDnk3J6sHLowxJoDPTMkXw1u-TtXKX5W5HR5jQhndBwdeOiuna31fqWCXzFCOchRXXOYvtV6nX0li5LEICJe2438pqQRHUj_95xTOQPGHkge7387mHOyZ-QU42flN8BIMqtDFyLCbTteeayym0LsoDXvr2czrZinYNGtYnY7TxSR7n0EPeR_vdt8AENMNOg62g7b0sggG9dd-rRHlqgnRJI55FiWW47KR7gBESEuGEkVMmQlOjaYKa-EqhGMXdmiXHLlkQ0lDEisTyYkxLsDDV6AwT-fmGsAK0tRigxh1WVMiraRaSMUwlS6wIYm6AUW_QqOPzccYo-3i3P7R_gSOGv12a9R66zTvwLG3SQDBsHtQyBYr8wAO1Wc2WS4eg2G_ADcZpGU |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+%28International+Conference+on+Communication+Systems+and+Network+Technologies+Online%29&rft.atitle=A+new+Polynomial+based+Symmetric+Key+Algorithm+using+Polynomial+Interpolation+Methods&rft.au=Hasija%2C+Taniya&rft.au=Ramkumar%2C+K.+R.&rft.au=Singh%2C+Bhupendra&rft.au=Kaur%2C+Amanpreet&rft.date=2023-04-08&rft.pub=IEEE&rft.eissn=2473-5655&rft.spage=675&rft.epage=681&rft_id=info:doi/10.1109%2FCSNT57126.2023.10134686&rft.externalDocID=10134686 |