Post-Quantum Crystography System for Secure Electronic Voting (original) (raw)

Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography

2013

Crystography is the combination of Cryptography and Steganography for enhancing the security of communications over enterprise networks. Most existing Crystographic systems are based on Public key Cryptographic schemes like RSA and Elliptic Curve Cryptography (ECC), whose security depends on the difficulty of solving Integer Factorisation Problem (IFP) and Discrete Logarithm problem (DLP) respectively. However, techniques for solving IFP and DLP problems, improves continually. Therefore, the existence of Quantum Computers in the range of 1000 bits would be a real world threat to systems based on those problems. This paper thus propose a new Crystographic System that combines Post Quantum Cryptography with Steganography to ensure that security of communication is maintained both in Classical Computing era as well as Post-Quantum Computing era.

Quantum Cryptography: The Future of Internet and Security Management

JMSS, A2Z Journals, 2021

In today's world, the cryptography techniques are used and implemented on the elementary method of finding the prime factor of large integer, which is said to be "Inevitable to Track". But living in an era where nothing is impossible to achieve, so cryptography techniques are exposed to both technologies' advancement in computational power of machines and advancement in the fields of mathematics to break the notion that factoring of large integers into their prime is impossible. To cope up with the threat that cryptography will face is handled by fusion of physics into cryptography, leading to the evolution of Quantum Cryptography. It is one of the fast-growing fields in computer technology. In this paper, I am going to brief the concepts of Quantum Cryptography and how this technology has led to the development of the strategy of complete secure key distribution. The paper covers the loophole present in the modern cryptography techniques, the fundamental principle of quantum cryptography, its implementation in the real world along with the limitation faced in this field, and the possible future of quantum cryptography.

Quantum Cryptography and its Application

International Journal of Advanced Networking and Applications

Present cryptography algorithms are based on mathematical problem such as factoring two large prime numbers and N vs NP problem. But computing power and evolution in mathematics increases day by day so it’s easy to reverse one way function to quickly such as that of factoring large integers. So the solution is to build a cryptosystem which secure our communication even the computing power is to high so we introduce quantum physics in cryptography which lead to evaluation of quantum cryptography. Quantum cryptography one of the emerging topics in field of computer industry. This paper is an attempt to review fundamentals of quantum cryptography and also analyses few application areas of quantum cryptography and it’s limitation.

The_problem_of_quantum_computers_in_cryptography_a.pdf

2018

This paper presents the problem that quantum computing brings to modern cryptography. The basics of post-quantum cryptography and concepts of modern cryptography with an emphasis on the most useful asymmetric encryption algo- rithms are shown. The paradigms of post-quantum cryp- tographic algorithms, which were implemented in the Open Quantum Safe project and whose effectiveness can be com- pared with the most popular modern ones, were explained and analysed further in this paper. To compare perfor- mances, a test of the time and communication capabili- ties of selected algorithms was made, the results of which were graphically and descriptively presented. The results of the experiment showed that there is an effective quantum- resistant alternative to existing asymmetric encryption al- gorithms.

Securing Electronic Voting System Using Crystographic Technique

ATBU, Journal of Science, Technology & Education (JOSTE), 2019

The aim of this paper is to design a secure electronic voting system that is based upon the electoral process for developing countries. The concept of voters’ information processing and storage arose immediate fears about election data security and privacy. If the voter’s choice is accessed by an illegitimate party, it may lead to malicious attack and any alteration of election results can affect the integrity of election. The need to secure electronic voting system through protection of voters’ data, confidentiality of casted vote during and after election becomes imminent. This paper addresses confidentiality and post-election auditing issues in electronic voting system using crystographic technique (a combination of cryptography and steganography). Electronic ballot confidentiality was addressed using crystographic algorithm involving synergistic combination of an enhanced Advance Encryption Standard (E-AES) and Space Insertion Text Semagram and post auditing issue of counted ballot was technically addressed with SHA-256 cryptographic Hash function. Performance evaluation of these techniques show that the developed integrated techniques can effectively handle confidentiality and post election auditng verification issues in electronic voting systems in digitally divided poll sites electoral votng scenerio.

Quantum cryptography: Overview, security issues and future challenges

2017

In recent years Quantum Cryptography gets more attention as well as becomes most promising cryptographic field for faster, effective and more secure communications. Quantum Cryptography is an art of science which overlap quantum properties of light under quantum mechanics on cryptographic task instead of current state of algorithms based on mathematical computing technology. Major algorithms for public key encryption and some digital signature scheme such as RSA, El Gamal cryptosystem, hash function are vulnerable at quantum adversaries. Most of the factoring problem can be broken by Shore's algorithm and quantum computer threatens other hand discrete logarithm problem. Our paper describes why modern cryptography contributes quantum cryptography, security issues and future goals of modern cryptography.

Quantum Cryptography: A Survey

Advances in Intelligent Systems and Computing, 2019

This paper represents the overview of Quantum Cryptography. Cryptography is the art of secrecy and it is the use of quantum mechanical properties to perform cryptographic tasks. It is a way of securing the channel using quantum mechanics properties. There are so many examples of quantum cryptography but the most important example is Quantum Key Distribution, which provides a solution to the breaking of various popular public key encryption and signature schemes (e.g. RSA and ElGamal). This helps to solve the security problems and also makes the communication channel is more secure. There are so many advantages of quantum cryptography, one thing is that the quantum computer gives the quadratic speed up on the general problems and second thing is that the quantum cryptography lies in the fact it allows the completion of various cryptographic tasks. That is proven to be impossible using classical communication.

An Overview of Quantum Cryptography

Information Security Management Handbook, Fifth Edition, Volume 3, 2006

† Potentially solves significant keydistribution and management problems † Offers ahighly secure cryptographysolution † Is not meant to replace, nor will it replace, existing cryptographyt echnologies † Is anew hybrid model that combines quantum cryptographyand traditional encryption to create amuch moresecure system † Although not really readyf or widespread commercial use, is developing very fast.

On Quantum Cryptography

ЖУРНАЛ ЗА БЕЗБЈЕДНОСТ И КРИМИНАЛИСТИКУ

In the late twentieth century, human race entered the era ofinformation technology (IT). The IT industry, which deals with the production,processing, storage and transmission of information, has become an integralpart of the global economic system, a completely independent and significantsector of the economy. The dependence of the modern society on informationtechnologies is so great that omissions in information systems may lead tosignificant incidents. Telecommunications are the key information technologyindustry. However, information is very susceptible to various types of abuseduring transmission. The units for data storage and processing can bephysically protected from anyone wishing harm, but this does not hold truefor the communication lines that span hundreds or thousands of kilometersand are virtually impossible to protect. Therefore, the problem of informationprotection in the field of telecommunications is highly significant. Cryptology,particularly cryptography, deals w...