Evolution of Cryptographic Techniques: Overview of the Existing Approaches and Trends of the Development

Authors

  • Noman Abid American National University, USA

Keywords:

Cryptology, SKC, AKC, HC, PQC, QC, Block chain, IoT, 5G Networks, AI, KM, DAA, DS, QKD, LPA, CA, DC, S, Cryptographic Protocols

Abstract

Cryptography remains to be one of the oldest and indispensable principles of today’s information protection disciplines because it gives indispensable tools for protecting content and messages during the communicational and data transferring actions. This review surveys extant research on possible cryptographic methods and their applications in different fields comprising of conventional key-based and new-complexity key based cryptography, cryptography based on Block chain, Homomorphic Cryptography, Post Quantum Cryptography and other types of cryptography. New complicated threats, emergence of Quantum computing, AI, block chain, and 5G, IoT are posing new threats and challenges and opportunities in cryptography. In this paper, some of these areas to key issues include: problems such as vulnerability of the traditional cryptographic system to brute force attacks, the impact of new developments in quantum computing to current encryption security systems, and the problem of key management, and side channel attacks. This article addresses how cryptography is used in protecting emerging technologies such as how light weight cryptography is incorporated to IoT peripherals, how works cryptography is applied to block chain or crypto currencies, and artificial intelligence systems. While with the arrival of quantum computing capable of threatening the security of classical cryptographic methods, the focus of the cryptographic community shifts to post quantum options like QKD and lattices. The next section of the review also talks about directions for future development direction of cryptography, and emphasizes the importance of creating new cryptographic algorithm that caters for the demand of scalability efficient and security to meet the increasing development in technologies. Cryptology is still needed for protection of relevant information and for proving secure communication for the age of integrated and computer-oriented society. The further evolution of intricate cryptographic methods and their integration into the advanced technologies is useful to combat new threats and guarantee safety of information that is to be necessary in the following years.

References

Bardet, Magali, Jean-Chales Faugère, and Bruno Salvy, “On the Complexity of Gröbner Basis Computation of Semi-Regular Overdetermined Algebraic Equations,” Proceedings of International Conference on Polynomial System Solving, 2004, pp. 71–74

Jao, David, and Luca De Feo, “Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies,” Proceedings of International Workshop on Post-Quantum Cryptography 2011, Lecture Notes in Computer Science, 7071, Springer, 2011, pp. 19–34.

Kampanakis, Panos, Douglas Stebila, Markus Friedl, Torben Hansen, and Dimitrios Sikeridis, “PostQuantum Public Key Algorithms for the Secure Shell (SSH) Protocol, Draft-KampanakisCurdle-PQ-SSH-00,” Internet-Draft, Internet Engineering Task Force, 2020 (available at https://tools.ietf.org/pdf/draft-kampanakis-curdle-pq-ssh-00.pdf)

Kaplan, Marc, Gaëtan Leurent, Anthony Leverrier, and María Naya-Plasencia, “Breaking Symmetric Cryptosystems Using Quantum Period Finding,” Proceedings of CRYPTO 2016, Lecture Notes in Computer Science, 9815, Springer, 2016, pp. 207–237.

Kipnis, Aviad, Jacques Patarin, and Louis Goubin, “Unbalanced Oil and Vinegar Signature Schemes,” Proceedings of EUROCRYPT 1999, Lecture Notes in Computer Science, 1592, Springer, 1999, pp. 206–222.

McEliece, Robert J., “A Public-Key Cryptosystem Based on Algebraic Coding Theory,” The Deep Space Network Progress Report, DSN PR 42–44, National Aeronautics and Space Administration, pp. 114–116

L. J. Trautman, M. T. Hussein, L. Ngarnassi, and M. J. Molesky, Governance of the Internet of Things (loT), 60. JURIMETRICS J, 315- 51, (2020).

K. R. Gamache, Critical Infrastructure: Water and Wastewater Systems Sector. Encyclopedia of Security and Emergency Management, 171- 181, (2021).

G. N. Nguyen, N. V. Le, M. Elhoseny, K. Shankar, B. B. Gupta, and A. A. Abd El-Latif, Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model. Journal of parallel and distributed computing, 153, 150-160, (2021).

M. Bozdal, M. Samie, S. Aslam, and I. Jennions, Evaluation of can bus security challenges. Sensors, 20(8), 2364, (2020). [5] M. V. Rao, D. A. Reddy, A. Ampavathi, and S. Munawar, Data Mining for Cyber Physical Systems. Data Mining and Machine Learning Applications, 235-280, (2022).

N. L. Bhatia, V. K. Shukla, R. Punhani, and S. K. Dubey, Growing Aspects of Cyber Security in E-Commerce. In 2021 International Conference on Communication information and Computing Technology (ICCICT) (pp. 1-6). IEEE, (2021). Journal of Applied and Emerging Sciences Vol (13), Issue (01) http://dx.doi.org/10.36785/jaes.131546 7

C. Singh, and L. Kaur, The A REVIEW OF DIFFERENT APPROACHES FOR IMPROVING NETWORK SECURITY IN CRYPTOGRAPHY. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(1), 819-823, (2021).

Khraisat, and A. Alazab, A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity, 4(1), 1-27, (2021).

Lele, Quantum Cryptography. In Quantum Technologies and Military Strategy (pp. 39-54). Springer, Cham, (2021).

M. Warner, J. Childress, the Use of Force for State Power: History and Future. Springer Nature, (2020).

L. A. Mayer, J. Schmid, S. J. Litterer, and M. S. Blumenthal, A Structured Elicitation Approach to Identify Technology Based Challenges: With Application to Inform Force Planning for Technological Surprise. RAND CORP SANTA MONICA CA, (2021).

D. W. Archer, T. Calderón Trilla, J. Dagit, A. Malozemoff, Y. Polyakov, K. Rohloff, G. Ryan, Ramparts: A programmer-friendly system for building homomorphic encryption applications. In Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography pp. 57-68, (2019).

T. M. Fernández-Caramés, O. Blanco-Novoa, I. Froiz-Míguez, and P. Fraga-Lamas, towards an autonomous industry 4.0 warehouse: A UAV and blockchain-based system for inventory and traceability applications in big data-driven supply chain management. Sensors, 19(10), 2394, (2019).

Hameed, M., Yang, F., Bazai, S. U., Ghafoor, M. I., Alshehri, A., Khan, I., & Jaskani, F. H. (2022). Urbanization Detection Using LiDAR-Based Remote Sensing Images of Azad Kashmir Using Novel 3D CNNs. Journal of Sensors, 2022.

Hameed, M., Yang, F., Bazai, S. U., Ghafoor, M. I., Alshehri, A., Khan, I., & Andualem, M. (2022). Convolutional AutoencoderBased Deep Learning Approach for Aerosol Emission Detection Using LiDAR Dataset. Journal of Sensors, 2022.

Feng, S., Liu, Q., Patel, A., Bazai, S. U., Jin, C. K., Kim, J. S., & Wilson, B. (2022). Automated pneumothorax triaging in chest X‐rays in the New Zealand population using deep‐learning algorithms. Journal of Medical Imaging and Radiation Oncology.

Bazai, S. U., Jang-Jaccard, J., & Wang, R. (2017, December). Anonymizing k-NN classification on MapReduce. In International Conference on Mobile Networks and Management (pp. 364-377). Springer, Cham

Jamil, A., ali Hameed, A., & Bazai, S. U. (2021). Land Cover Classification using Machine Learning Approaches from High Resolution Images. Journal of Applied and Emerging Sciences, 11(1), pp-108.

Asghar, M. N., Saleemi, F. J., Iqbal, S., Chaudhry, M. U., Yasir, M., Bazai, S. U., & Khan, M. Q. (2021). A Novel Parts of Speech (POS) Tagset for morphological, syntactic and lexical annotations of Saraiki language. Journal of Applied and Emerging Sciences, 11(1), pp-77.

Abbas, H., Hussain, D., Khan, G., ul Hassan, S. N., Kulsoom, I., & Hussain, S. (2021). Landslide Inventory and Landslide Susceptibility Mapping for China Pakistan Economic Corridor (CPEC)’s main route (Karakorum Highway). Journal of Applied and Emerging Sciences, 11(1), pp-18

Naeem, S., & Ali, A. (2022). Bees Algorithm Based Solution of NonConvex Dynamic Power Dispatch Issues in Thermal Units. Journal of Applied and Emerging Sciences, 12(1).

Ali, A., & Naeem, S. (2022). The Controller Parameter Optimization for Nonlinear Systems Using Particle Swarm Optimization and Genetic Algorithm. Journal of Applied and Emerging Sciences, 12(1).

M. Diamantaris, F. Marcantoni, S. Ioannidis, and J. Polakis, The seven deadly sins of the HTML5 WebAPI: a large-scale study on the risks of mobile sensor-based attacks. ACM Transactions on Privacy and Security (TOPS), 23(4), pp. 1-31, (2020).

Chesney, and D. Citron, Deep fakes: A looming challenge for privacy, democracy, and national security. Calif. L. Rev., 107, 1753, (2019).

M. Elbadry, P. Milder, Y. Yang, Pub/sub in the air: A novel datacentric radio supporting robust multicast in edge environments. In 2020 IEEE/ACM Symposium on Edge Computing (SEC), IEEE, pp. 257-270, (2020).

D. Deebak, and F. Al-Turjman, A smart lightweight privacy preservation scheme for IoT-based UAV communication systems. Computer Communications, 162, pp. 102-117, (2020).

Koenig, Cacophony or Concerto?: Analyzing the Applicability of the Wiretap Act's Party Exception for Duplicate GET Requests. Fordham L. Rev., 90, pp. 951, (2021).

B. Al-Hayani, and H. Ilhan, Efficient cooperative image transmission in one-way multi-hop sensor network. The International Journal of Electrical Engineering & Education, 57(4), pp. 321-339, (2020).

Mittelbach, and M. Fischlin, the Theory of Hash Functions and Random Oracles. An Approach to Modern Cryptography, Cham: Springer Nature, (2021).

S. Bhattacharya, Cryptology and information security-past, present, and future role in society. International Journal on Cryptography and Information Security (IJCIS), 9(1/2), (2019).

A. Siyal, A. Z. Junejo, M. Zawish, K. Ahmed, A. Khalil, and G. Soursou, Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives. Cryptography, 3(1), 3, (2019).

Abu, and Z. A. Alqadi, Using Highly Secure Data Encryption Method for Text File Cryptography. International Journal of Computer Science & Network Security, 21(12), pp. 53-60, (2021).

M. S. Darup, A. B. Alexandru, D. E. Quevedo, and G. J. Pappas, Encrypted control for networked systems: An illustrative introduction and current challenges. IEEE Control Systems Magazine, 41(3), 58-78, (2021).

C. P. Rosé, E. A. McLaughlin, R. Liu, and K. R. Koedinger, Explanatory learner models: Why machine learning (alone) is not the answer. British Journal of Educational Technology, 50(6), 2943-2958, (2019).

S. Perera, S.Nanayakkara, Rodrigo, S. Senaratne, and R. Weinand, Blockchain technology: Is it hype or real in the construction industry? Journal of Industrial Information Integration, 17, 100125, (2020).

M. Ali, A. Ismail, H. Elgohary, S. Darwish, and S. Mesbah, A Procedure for Tracing Chain of Custody in Digital Image Forensics: A Paradigm Based on Grey Hash and Blockchain. Symmetry, 14(2), 334, (2022).

S. Sengan, V. Subramaniyaswamy, S. K. Nair, V. Indragandhi, J. Manikandan, and L. Ravi. Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public datasmart network. Future generation computer systems, 112, 724-737, (2020).

D. Wang, B. Bai, K. Lei, W. Zhao, Y. Yang, and Z. Han. Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city. IEEE Access, 7, 54508-54521, (2019).

H. T. Wu, and C. W. Tsai. An intelligent agriculture network security system based on private blockchains. Journal of Communications and Networks, 21(5), 503-508, (2019).

C. Singh, and L. Kaur, The A REVIEW OF DIFFERENT APPROACHES FOR IMPROVING NETWORK SECURITY IN CRYPTOGRAPHY. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(1), 819-823, (2021).

S. Matted, G. Shankar, and B. B. Jain, Enhanced Image Security Using Stenography and Cryptography. In Computer Networks and Inventive Communication Technologies (pp. 1171-1182). Springer, Singapore, (2021).

J. R. Lindsay, Demystifying the quantum threat: infrastructure, institutions, and intelligence advantage. Security Studies, 29(2), 335- 361, (2020).

J. E. BEDI, International History of the Formative Years, Institution of Electrical Engineers, London. The Froehlich/Kent Encyclopedia of Telecommunications: Volume 18-Wireless Multiple Access Adaptive Communications Technique to Zworykin: Vladimir Kosma, 266, (2021).

C. L. Chowdhary, P. V. Patel, K. J. Kathrotia, M. Attique, K. Perumal, and M. F. Ijaz, Analytical study of hybrid techniques for image encryption and decryption. Sensors, 20(18), 5162, (2020).

H. Xu, K. Thakur, A. Kamruzzaman, and M. Ali, Applications of Cryptography in Database: A Review. In 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) (pp. 1-6). IEEE, (2021).

Kaur, J., & Ramkumar, K. R. (2022). The recent trends in cyber security: A review. Journal of King Saud University-Computer and Information Sciences, 34(8), 5766-5781.

Bhutta, M. N. M., Khwaja, A. A., Nadeem, A., Ahmad, H. F., Khan, M. K., Hanif, M. A., & Cao, Y. (2021). A survey on blockchain technology: Evolution, architecture and security. Ieee Access, 9, 61048-61073.

Faruk, M. J. H., Tahora, S., Tasnim, M., Shahriar, H., & Sakib, N. (2022, May). A review of quantum cybersecurity: threats, risks and opportunities. In 2022 1st International Conference on AI in Cybersecurity (ICAIC) (pp. 1-8). IEEE.

Himeur, Y., Sohail, S. S., Bensaali, F., Amira, A., & Alazab, M. (2022). Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives. Computers & Security, 118, 102746.

Ometov, A., Bardinova, Y., Afanasyeva, A., Masek, P., Zhidanov, K., Vanurin, S., & Bezzateev, S. (2020). An overview on blockchain for smartphones: State-of-the-art, consensus, implementation, challenges and future trends. IEEE Access, 8, 103994-104015.

Bhuiyan, M. N., Rahman, M. M., Billah, M. M., & Saha, D. (2021). Internet of things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities. IEEE Internet of Things Journal, 8(13), 10474-10498.

Downloads

Published

2022-07-18

How to Cite

Abid, N. (2022). Evolution of Cryptographic Techniques: Overview of the Existing Approaches and Trends of the Development. BULLET : Jurnal Multidisiplin Ilmu, 1(03), 523–538. Retrieved from https://journal.mediapublikasi.id/index.php/bullet/article/view/4813