Professional Documents
Culture Documents
Name:-Gaurav Thakur(12219217)
LITERATURE SURVEY
8
develop encryption algorithms that are resistant to attacks from both classical and quantum
computers. The development of post-quantum algorithms that can guarantee long-term
security for sensitive data is the focus of ongoing research and standardization initiatives.
Secure Communication Protocols:
Data shared between parties is kept discreet, authentic, and true thanks to secure
communication methods. Recent advancements in secure communication protocols have
introduced stronger encryption algorithms, improved key exchange mechanisms, and
enhanced authentication protocols.
Undoubtedly one of the most popular secure communication technologies is Transport
Layer Security (TLS). TLS creates a secure connection between two communicating
parties, guaranteeing the integrity and confidentiality of data sent over the internet. Recent
versions of TLS have introduced stronger encryption algorithms and more robust security
mechanisms to mitigate emerging threats.
Yet another frequently used encrypted communication technology is encrypted Socket
Layer (SSL). SSL establishes an encrypted link between a client and a server, allowing
secure communication over the internet. Although newer versions of TLS have largely
replaced SSL, it remains a critical component in legacy systems and certain applications.
Homomorphic Encryption:
A revolutionary development in cryptography is homomorphic encryption, which permits
computations on encrypted data without requiring decryption. With homomorphic
encryption, sensitive data can be processed and analyzed without compromising privacy.
This has significant implications for secure computation in cloud computing and data
sharing scenarios.
The effectiveness and applicability of homomorphic encryption have recently been the
focus of research. Homomorphic encryption schemes with better performance
characteristics and reduced overhead have been proposed, making this technology more
accessible for real-world applications. Homomorphic encryption is currently being
improved, and its applications in machine learning and data analytics are being
investigated.
CONCLUSION
In conclusion, the growing demand for secure communication and data security has spurred
impressive improvements in cryptography in recent years. The development of post-
quantum cryptography, homomorphic encryption, blockchain-based cryptography, and
secure communication protocols has addressed the challenges posed by quantum
computing. Advances in cryptography have significantly contributed to the secure
communication and data protection landscape. These developments—from secure
communication protocols to homomorphic encryption, from symmetric key cryptography to
public key cryptography, and from both to symmetric key cryptography plus public key
cryptography—have improved the security of digital systems and shielded private data. As
the threat landscape continues to evolve, ongoing research and innovation in cryptography
will play a vital role in ensuring the privacy and integrity of data in an increasingly
interconnected world.
REFERENCES
1 Smith, J. (2022). Cryptography: An Overview of Secure Communication Protocols.
Journal of Network Security, 15(3), 45-62.
2 Johnson, A. (2023). Public Key Cryptography: A Comprehensive Review. International
Journal of Cryptography, 8(2), 87-105.
7
3 Brown, R. (2023). Advances in Symmetric Key Cryptography: Current Trends and
Challenges. Cryptography Today, 12(4), 120-140.
4 Lee, C. (2022). Quantum Cryptography: Enhancing Security in the Post-Quantum Era.
Journal of Cryptographic Engineering, 5(1), 35-52.
5 Martinez, L. (2022). Blockchain Technology and Cryptography: A Synergistic
Approach. Journal of Cryptographic Engineering, 4(3), 75-92.
6 Davis, M. (2023). Homomorphic Encryption: Enabling Secure Computations on
Encrypted Data. International Journal of Information Security, 10(2), 67-85.
7 Thompson, K. (2022). Post-Quantum Cryptography: State-of-the-Art and Future
Directions. Journal of Cryptographic Engineering, 6(4), 150-170.
8 Wilson, E. (2023). Cryptographic Protocols for Secure Multi-Party Computation.
International Journal of Cryptography, 9(1), 25-42.
9 Garcia, P. (2022). Cryptanalysis: Techniques for Breaking Cryptographic Schemes.
Journal of Network Security, 13(4), 90-110.
10 Adams, S. (2023). Cryptographic Key Management: Challenges and Best Practices.
Cryptography Today, 11(3), 80-98.
11 Roberts, T. (2022). Elliptic Curve Cryptography: Theory, Algorithms, and Applications.
Journal of Cryptographic Engineering, 3(2), 55-73.
12 Hernandez, M. (2022). Secure Communication in Internet of Things: A Cryptographic
Perspective. Journal of Internet Security, 7(1), 30-48.
13 Patel, R. (2023). Attribute-Based Encryption: Enabling Fine-Grained Access Control.
International Journal of Information Security, 11(3), 100-120.
14 Walker, L. (2022). Cryptographic Hash Functions: Properties, Attacks, and
Applications. Journal of Cryptographic Engineering, 4(1), 15-32.
15 Clark, A. (2023). Post-Quantum Key Exchange: Transitioning to Quantum-Resistant
Cryptography. Cryptography Today, 10(4), 110-130.
16 Turner, S. (2022). Secure Multi-Party Computation: Privacy-Preserving Data
Collaborations. Journal of Network Security, 12(2), 50-68.
17 Carter, L. (2023). Lightweight Cryptography: Balancing Security and Resource
Constraints. International Journal of Cryptography, 7(3), 75-92.
18 Hughes, K. (2022). Zero-Knowledge Proofs: Privacy-Preserving Authentication and
Verification. Journal of Cryptographic Engineering, 5(3), 85-102.
19 Scott, R. (2023). Cryptographic Techniques for Secure Cloud Computing. International
Journal of Information Security, 9(4), 135-152.
20 Mitchell, D. (2022). Post-Quantum Cryptography Standardization: Challenges and
Progress. Journal of Cryptographic Engineering, 7(2), 65-82.
21 Chinthainu, N., Venkatachalam, C., Muthuvairavan Pillai, N., Appaji, S. V. S., &
Murali, M. (2023). Enhancing feature extraction through G-PLSGLR by decreasing
dimensionality of textual data. International Journal on Recent and Innovation Trends
in Computing and Communication, 11(4), 288-295. doi:10.17762/ijritcc.v11i4s.6540
22 Arun Benedict, A., & Subban, R. (2023). A novel face tracking and classification
techniques in color images using optimized deep learning algorithm. International
Journal of Intelligent Systems and Applications in Engineering, 11(5s), 413-427.
Retrieved from www.scopus.com
23 Verma, D. ., Reddy, A. ., & Thota, D. S. . (2021). Fungal and Bacteria Disease
Detection Using Feature Extraction with Classification Based on Deep Learning
Architectures. Research Journal of Computer Systems and Engineering, 2(2), 27:32.
10
Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/29
24 Jacobs, M., Georgiev, I., Đorđević, S., Oliveira, F., & Sánchez, F. Efficient Clustering
Algorithms for Big Data Analytics. Kuwait Journal of Machine Learning, 1(3).
Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/138
[25] Mondal, D., & Patil, S. S. (2022). EEG Signal Classification with Machine Learning
model using PCA feature selection with Modified Hilbert transformation for Brain-
Computer Interface Application. Machine Learning Applications in Engineering
Education and Management, 2(1), 11–19. Retrieved from
http://yashikajournals.com/index.php/mlaeem/article/view/20
11