Abstract
Cryptography is a complex field that has evolved significantly over the years. It is essential for the secure communication of sensitive information online. However, with the increase in cyber-attacks, kee** up with the latest trends, and identifying potential problems has become more important than ever. In this paper, authors try to explore the latest trends in cryptography, highlighting the problems that come with them, and discussing potential solutions for each. From quantum computing to blockchain technology, authors will delve into the complexities of cryptography, providing you with the knowledge and tools to navigate through this essential field with confidence.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kessler GC. An overview of cryptography
May P, Ehrlich HC, Steinke T (2006) ZIB structure prediction pipeline: composing a complex biological workflow through web services. In: Nagel WE, Walter WV, Lehner W (eds) Euro-par 2006, vol 4128. LNCS. Springer, Heidelberg, pp 1148–1158
Kh-Madhloom J (2022) Dynamic cryptography integrated secured decentralized applications with blockchain programming. Wasit J Comput Math Sci 1(2):21–33
Guo H, Yu X (2022) A survey on blockchain technology and its security. Blockchain Res Appl 3(2):100067. ISSN 2096-7209. https://doi.org/10.1016/j.bcra.2022.100067
Zhang P et al (2021) A blockchain system based on quantum-resistant digital signature. Secur Commun Netw, pp 1–13
Al Badawi A, Bates J, Bergamaschi F, Cousins DB, Erabelli S, Genise N, Halevi S, Hunt H, Kim A, Lee Y, Liu Z, Micciancio D, Quah I, Polyakov Y, Saraswathy RV, Rohloff K, Saylor J, Suponitsky D, Triplett M, Vaikuntanathan V, Zucca V (2022) OpenFHE: open-source fully homomorphic encryption library. In: Proceedings of the 10th workshop on encrypted computing & applied homomorphic cryptography (WAHC’22). Association for Computing Machinery, New York, NY, pp 53–63. https://doi.org/10.1145/3560827.3563379
Samardzic N, Feldmann A, Krastev A, Devadas S, Dreslinski R, Peikert C, Sanchez D (2021) F1: a fast and programmable accelerator for fully homomorphic encryption. In: MICRO-54: 54th annual IEEE/ACM international symposium on microarchitecture (MICRO ‘21). Virtual Event, Greece. ACM, New York, NY, USA, 15 Pages. https://doi.org/10.1145/3466752.3480070
Joseph D, Misoczki R, Manzano M et al (2022) Transitioning organizations to post-quantum cryptography. Nature 605:237–243. https://doi.org/10.1038/s41586-022-04623-2
Paquin C, Stebila D, Tamvada G (2020) Benchmarking Post-quantum Cryptography in TLS. In: Ding JP, Tillich JP (eds), Post-quantum cryptography, PQ crypto 2020, Lecture notes in computer science, vol 12100. Springer, Cham. https://doi.org/10.1007/978-3-030-44223-1_5
Ahn J, Kwon H-Y, Ahn B, Park K, Kim T, Lee M-K, Kim J, Chung J (2022) Toward quantum secured distributed energy resources: adoption of post-quantum cryptography (PQC) and quantum key distribution (QKD). Energies 15(3):714. https://doi.org/10.3390/en15030714
Abdalzaher MS, Fouda MM, Emran A, Fadlullah ZM, Ibrahem MI (2023) A Survey on key management and authentication approaches in smart metering systems. Energies 16(5):2355. https://doi.org/10.3390/en16052355
Abdalzaher MS, Fouda MM, Emran A, Fadlullah ZM, Ibrahem MI (2023) A Survey on key management and authentication approaches in smart metering systems. Energies 16:2355. https://doi.org/10.3390/en16052355
Sharafi M, Fotouhi-Ghazvini F, Shirali M, Ghassemian M (2019) A low power cryptography solution based on chaos theory in wireless sensor nodes. IEEE Access 7:8737–8753. https://doi.org/10.1109/ACCESS.2018.2886384
Demers D, Lee H (2022) Kerberoasting: case studies of an attack on a cryptographic authentication technology. Int J Cybersecur Intell Cybercrime 5(2):25–39. https://vc.bridgew.edu/ijcic/vol5/iss2/3
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Joshi, V., Verma, S. (2023). Navigating the Complexities of Cryptography: Trends, Problems, and Solutions. In: Tuba, M., Akashe, S., Joshi, A. (eds) ICT Systems and Sustainability. ICT4SD 2023. Lecture Notes in Networks and Systems, vol 765. Springer, Singapore. https://doi.org/10.1007/978-981-99-5652-4_10
Download citation
DOI: https://doi.org/10.1007/978-981-99-5652-4_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-5651-7
Online ISBN: 978-981-99-5652-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)