Cryptography

Cryptography

Cryptography and Encryption

Overview of Cryptography and Encryption in relation to cyber crime: [1]There are various methods of encrypting messages depending on the type of communication that is being protected. In general, the more valuable or sensitive the data, the greater or ”stronger” the encryption needs to be. All encrypted data require a ”key” to decipher. The key is like a key to a car or building, because it enables people to unlock the meaning of what otherwise is gibberish or a message that does not really mean what it purports to mean. During World War II, the British Secret Intelligence Service and French Resistance regularly broadcast clearly understandable radio messages in either English or French that actually meant something very different from the audible information transmitted. But only those people who knew the key to the coded message could discern what military actions were needed or were about to occur. In many forms of computer-generated encryption a key is created during the encrypting process. Computerized keys normally consist of a string of values that are mathematically incorporated into an algorithm to generate ciphertext (i.e., indiscernible code of some kind). This key is then required to decrypt the ciphertext into ”plaintext”—a written language like English, French, German, Russian, and so forth.

Group Signature System Using Multivariate Asymmetric Cryptography, the Law and other Social Sciences

This Chapter presents a new group signature scheme using multivariate asymmetric cryptography. Compared with the exited signature schemes, The proposed scheme is applicable to e-voting schemes and can convince the requirements of e-voting schemes because it has two important characteristics, Traceability and Unlinkability. Traceability denotes that a group director cannot open the signature alone. He has to collaborate with a verifier to disclose an identity of the signer. Unlinkability denotes that the group signature can be split accordance to time durations. Then signatures are linkable in the same time range, but un-linkable between dissimilar time periods. Therefore, the count authority can notice the double-votes prior to open them. Thus, there are two features in the proposed signature, for count and supervision authority. Also, the size of signatures and the calculation overhead are private from the group members in the proposed scheme. So, it is efficient for large groups.[1]

Resources

Notes and References

  1. Sattar Aboud, “Group Signature System Using Multivariate Asymmetric Cryptography” (Encyclopedia of Information Science and Technology, 4th Edition, Information Resources Management Association, 2018)

Resources

Notes and References

1. By Gary Scarborough

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Kruse, W.G., & Heiser, J.G. (2002). Computer forensics: Incident response essentials. Boston: Addison-Wesley; Schneier, B. (2000). Secrets and lies: Digital security in a networked world. New York: John Wiley & Sons, Inc.; Wang, W. (2001). Steal this computer book 2. San Francisco: No Starch Press; Menezes, A., van Oorschot, P., & Vanstone, S. (1996). Handbook of applied cryptography. Boca Raton, FL: CRC Press.

Hierarchical Display of Cryptography

Education And Communications > Information technology and data processing > Data processing > Coding

Cryptography

Concept of Cryptography

See the dictionary definition of Cryptography.

Characteristics of Cryptography

[rtbs name=”xxx-xxx”]

Resources

Translation of Cryptography

Thesaurus of Cryptography

Education And Communications > Information technology and data processing > Data processing > Coding > Cryptography

See also

  • Shadow banking system
  • Non-bank credit activity
  • Shadow financial system

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *