SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal on Cryptography and Information
Security (IJCIS)
ISSN: 1839 ~ 8626
http://wireilla.com/ijcis/index.html
Current Issue: June 2020, Volume 10, Number 2
https://wireilla.com/ijcis/vol10.html
Paper -01
SELECTIVE ENCRYPTION OF IMAGE BY
NUMBER MAZE TECHNIQUE
Santosh Mutnuru, Sweeti Kumari Sah and S. Y Pavan Kumar
Eastern Michigan University, USA
ABSTRACT
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with
huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from
unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to
share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of
multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-
based algorithm has never been adequately studied. This paper introduces a new selective encryption-
based security system which will transfer data with protection even in unauthenticated network. Selective
encryption-based security system will also minimize time during encryption process which there by
achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT
transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides
security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
KEYWORDS
multimedia security, selective encryption; DCT compression; cipher image
For More Details: https://wireilla.com/ijcis/abstract/10220ijcis01.html
Volume Link: https://wireilla.com/papers/ijcis/V10N2/10220ijcis01.pdf
REFERENCES
[1] Sesha Pallavi Indrakanti and P.S.Avadhani, “Permutation based image encryption technique,”
International Journal of Computer Applications, vol. 28– No.8, August 2011, pp. 45-47.
[2] Sukalyan Som & Sayani Sen, (2013) “A Non-adaptive Partial Encryption of Grayscale Images based
on Chaos”, Procedia Technology, vol. 10, pp. 663-671.
[3] Mutnuru, S., PhD. (2016). The role of internal controls on employees' engagement in small
organizations. JournalofBusinessStudiesQuarterly,7(4),102-114.Retrievedfrom
http://search.proquest.com/docview/1807472170?accountid=35812
[4] P.R. Sankpal, P.A. Vijaya, "Image Encryption Using Chaotic Maps: A Survey", 2014 Fifth
International Conference on Signal and Image Processing (ICSIP), Karnataka (India), pp. 102-107, 8-
10 Jan. 2014. DOI:10.1109/ICSIP.2014.80
[5] Kundankumar Rameshwar Saraf, Vishal Prakash Jagtap and Amit Kumar Mishra, “Text and Image
Encryption Decryption Using Advanced Encryption Standard,” IJETTCS, vol. 3, June 2014, pp. 118-
126.
[6] GĂśVENOÄžLU, E , RAZBONYALI, C . (2019). The Creation of Maze in Order to Hide Data, and the
Proposal of Method Based on AES Data Encryption Algorithm. El-Cezeri Journal of Science and
Engineering , 6 (3) , 668-680 . DOI: 10.31202/ecjse.571030
[7] Deepti C. Gavankar, C. Madhumita, and Suhas J. Lawand, “Secure Real Time Remote Video
Monitoring Using Selective Encryption”, IEEE paper, 2012, pp. 453-457.
[8] Tieyu Zhao, Qiwen Ran & Yingying Chi, (2015) “Image encryption based on nonlinear encryption
system and public-key cryptography”, Optics Communications, vol 338, pp. 64-72.
[9] A. Alfalou, C. Brosseau & N. Abdallah, (2015) “Simultaneous compression and encryption of color
video images”, Optics Communications, vol 338, pp. 371-379.
[10]R. Gupta, A. Aggarwal & S.K. Pal, “Design and Analysis of New Shuffle Encryption Schemes for
Multimedia”, Defence Science Journal, Vol. 62, No. 3, May 2012, pp.159-166.
[11]P. Maggo, Dr R.S. Chhillar, “Security of Multimedia Data: A Review Paper on various Image Security
Algorithms”, National Conference on Advanced Computing Technologies, Vol. 2, March 2013,pp.
852-857.
[12]Pavithra. C and Vinod. B. Durdi, “Analization and Comparison of Selective Encryption Algorithms
with Full Encryption for Wireless Networks”, International Journal of Engineering Trends and
Technology (IJETT), vol. 4 Issue 5,May 2013.
[13]Droogenbroeck, Marc & Benedett, Raphal. (2002). Techniques For A Selective Encryption Of
Uncompressed And Compressed images.
Paper -02
TOWARDS A DEEPER NTRU ANALYSIS: A MULTI
MODAL ANALYSIS
Chuck Easttom1
, Anas Ibrahim2
, Alexander Chefranov3
, Izzat Alsmadi4
and
Richard Hansen5
1
Adjunct Georgetown University and University of Dallas
2&3
Eastern Mediterranean University
4
Texas A&M University
5
Capitol Technology University
ABSTRACT
NTRU is being considered as part of the NIST quantum resistant cryptography standard. While NIST has
received substantial attention in the literature, more analysis is needed. This current study uses a unique
approach. The team of researchers divided into -sub-teams. Each is using a separate analysis technique on
NTRU. Then the diverse -sub-teams' work was brought together into a single cohesive statistical analysis to
provide well-founded conclusions regarding NTRU.
KEYWORDS
NTRU, NTRU Encrypt, Post Quantum Cryptography, Quantum Resistant Cryptography
For More Details: https://wireilla.com/ijcis/abstract/10220ijcis02.html
Volume Link: https://wireilla.com/papers/ijcis/V10N2/10220ijcis02.pdf
REFERENCES
[1] Hoffstein, J., Pipher, J., & Silverman, J. H. An introduction to mathematical cryptography. New
York City, New York: Springer. 2014.
[2] Nayak, D. R., Nanda, A. K., Awasthi, P., & Kumar, L. (2015). Multiple private keys with NTRU
cryptosystem. IJRCCT, vol. 4, no. 3,pp. 250-255. 2015.
[3] Peikert, C. A decade of lattice cryptography. Foundations and Trends in Theoretical Computer
Science, vol. 10, no., pp. 283-424. 2016.
[4] .Fluhrer, S.R.Quantum Cryptanalysis of NTRU. IACR cryptology ePrint Archive, 2015, p.676. 2015.
[5] Jeong, S., Park, K. and Park, Y. Quantum resistant NTRU-based key distribution scheme for SIP. In
2018 International Conference on Electronics, Information, and Communication (ICEIC) (pp. 1-2).
IEEE. 2018.
[6] Kuznetsov, A., Kiian, A., Lutsenko, M., Chepurko, I., & Kavun, S. Code-based cryptosystems from
NIST PQC. In 2018 IEEE 9th International Conference on Dependable Systems, Services and
Technologies (DESSERT) (pp. 282-287). IEEE. 2018.
[7] Alagic, G., Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Liu, Y.K., Miller, C.,
Moody, D., Peralta, R. and Perlner, R.. Status report on the first round of the NIST post-quantum
cryptography standardization process. US Department of Commerce, National Institute of Standards
and Technology. 2019.
[8] Bernstein, Daniel J., Chitchanok C., Tanja L., and Van Vredendaal, C.. "NTRU Prime." IACR
Cryptology ePrint Archive 2016 (2016): 461.
[9] Singh, S. and Padhye, S., 2017. Cryptanalysis of NTRU with n Public Keys. In 2017 ISEA Asia
Security and Privacy (ISEASP) (pp. 1-6). IEEE
[10] Liu, Z., Pan, Y. and Zhang, Z., 2019, May. Cryptanalysis of an NTRU-Based Proxy Encryption
Scheme from ASIACCS’15. In International Conference on Post-Quantum Cryptography (pp. 153-
166). Springer, Cham.
[11] Huerta, C.E.V., 2019. A Description of the NTRU Cryptosystem and Its Cryptanalysis via the LL
Algorithm (Doctoral dissertation, San Diego State University).
[12] Albrecht, M., Bai, S. and Ducas, L., 2016, August. A subfield lattice attack on overstretched NTRU
assumptions. In Annual International Cryptology Conference (pp. 153-178). Springer, Berlin,
Heidelberg.
[13] Kirchner, P. and Fouque, P.A., 2017, April. Revisiting lattice attacks on overstretched NTRU
parameters. In Annual International Conference on the Theory and Applications of Cryptographic
Techniques (pp. 3-26). Springer, Cham.
[14] Duong, D.H., Yasuda, M. and Takagi, T., 2017, November. Choosing Parameters for the Subfield
Lattice Attack Against Overstretched NTRU. In International Conference on Information Security
(pp. 79-91). Springer, Cham.
[15] Bernstein, D.J., Chuengsatiansup, C., Lange, T. and van Vredendaal, C. NTRU Prime: reducing
attack surface at low cost. In International Conference on Selected Areas in Cryptography.pp. 235-
260. Springer, Cham. 2017
[16] Albrecht, M.R., Curtis, B.R., Deo, A., Davidson, A., Player, R., Postlethwaite, E.W., Virdia, F. and
Wunderer, T. September. Estimate all the {LWE, NTRU} schemes!. In International Conference on
Security and Cryptography for Networks (pp. 351-367). Springer, Cham. 2018.
[17] Valluri, M.R., 2018. Cryptanalysis of Xinyu et al.'s NTRU-lattice based key exchange protocol.
Journal of Information and Optimization Sciences, 39(2), pp.475-479.
[18] Huerta, C.E.V., A Description of the NTRU Cryptosystem and Its Cryptanalysis via the LL
Algorithm (Doctoral dissertation, San Diego State University). 2019.
[19] Yang, Z., Fu, S., Qu, L. and Li, C., 2018. A lower dimension lattice attack on NTRU. Science China
Information Sciences, vol. 61, no. 5, pp. 059101.
[20] Shoup, Victor. "NTL: A library for doing number theory. http." 2019.
[21] Yang, Z., Shaojing, F., Longjiang, Q., Chao, L.. A Lower Dimension Lattice Attack on NTRU
Supplementary File http://scis.scichina.com/en/2018/059101-supplementary.pdf. 2017.
[22] Chen, Y., & Nguyen, P. Q. (2011, December). BKZ 2.0: Better lattice security estimates.
In International Conference on the Theory and Application of Cryptology and Information
Security (pp. 1-20). Springer, Berlin, Heidelberg.
[23] Easttom, C., 2019, January. An Analysis of Leading Lattice-Based Asymmetric Cryptographic
Primitives. IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC),
pp. 0811-0818. 2019
[24] Easttom II, W.C., 2018. A Comparative Study of Lattice Based Algorithms for Post Quantum
Computing (Doctoral dissertation, Capitol Technology University). 2018.
[25] Pironio, S., AcĂ­n, A., Massar, S., de La Giroday, A. B., Matsukevich, D. N., Maunz, P., ... & Monroe,
C. (2010). Random numbers certified by Bell’s theorem. Nature, 464(7291), 1021-1024.
[26] Simion, E. (2015). The relevance of statistical tests in cryptography. IEEE Security & Privacy, 13(1),
66-70.
[27] Tadaki, K., & Doi, N. (2015). Cryptography and algorithmic randomness. Theory of Computing
Systems, 56(3), 544-580.
[28] Georgescu, C., Petrescu-Nita, A., Simion, E., & Toma, A. (2017). NIST Randomness Tests (in)
dependence. IACR Cryptology ePrint Archive, 2017, 336.
[29] Sulak, F., UÄžUZ, M., Kocak, O., & DoÄźanaksoY, A. (2017). On the independence of statistical
randomness tests included in the NIST test suite. Turkish Journal of Electrical Engineering &
Computer Sciences, 25(5), 3673-3683.
[30] Balasubramanian, K. Experiments with the Cryptool Software. Algorithmic Strategies for Solving
Complex Problems in Cryptography, pp. 186-194. 2018.
[31] Duan, G., Wang, Y., Li, M., Sheng, Y., Wang, J., & Zhang, S. Research on Techniques and Methods
of Developing Cryptography Virtual Laboratory. International Journal of Performability Engineering,
vol. 13, no. 8, pp. 1371-1381. 2017.
AUTHORS
Chuck Easttom, D.Sc., Ph.D. IEEE Senior Member, ACM Senior Member, Distinguished Speaker of the
ACM and IEEE. Adjunct lecturer at Georgetown University and Adjunct professor at University of Dallas
Anas Ibrahim, PhD Researcher at Eastern Mediterranean University
Alexander Chefranov Associate Professor at Eastern Mediterranean University
Izzat Alsmadi, Ph.D. Assistant Professor at Texas A&M University IEEE Senior Member
Richard Hansen Professor of Practice Capitol Technology University

More Related Content

What's hot

Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Rajesh Kumar
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkIAEME Publication
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligenceaciijournal
 
Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010Oladokun Sulaiman
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 malaOyeniyi Samuel
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs IJECEIAES
 
Top 10 neural networks
Top 10 neural networksTop 10 neural networks
Top 10 neural networksijsc
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
 
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...IJECEIAES
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
 
Training of Convolutional Neural Network using Transfer Learning for Aedes Ae...
Training of Convolutional Neural Network using Transfer Learning for Aedes Ae...Training of Convolutional Neural Network using Transfer Learning for Aedes Ae...
Training of Convolutional Neural Network using Transfer Learning for Aedes Ae...TELKOMNIKA JOURNAL
 
A study of existing ontologies in the io t domain
A study of existing ontologies in the io t domainA study of existing ontologies in the io t domain
A study of existing ontologies in the io t domainSof Ouni
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
 
New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...sipij
 
G04433953
G04433953G04433953
G04433953IOSR-JEN
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography cscpconf
 
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...ijtsrd
 

What's hot (20)

Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligence
 
Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010Book of abstract volume 8 no 9 ijcsis december 2010
Book of abstract volume 8 no 9 ijcsis december 2010
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
 
Top 10 neural networks
Top 10 neural networksTop 10 neural networks
Top 10 neural networks
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...
 
Training of Convolutional Neural Network using Transfer Learning for Aedes Ae...
Training of Convolutional Neural Network using Transfer Learning for Aedes Ae...Training of Convolutional Neural Network using Transfer Learning for Aedes Ae...
Training of Convolutional Neural Network using Transfer Learning for Aedes Ae...
 
A study of existing ontologies in the io t domain
A study of existing ontologies in the io t domainA study of existing ontologies in the io t domain
A study of existing ontologies in the io t domain
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
D010312230
D010312230D010312230
D010312230
 
New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...New Research Articles 2019 October Issue Signal & Image Processing An Interna...
New Research Articles 2019 October Issue Signal & Image Processing An Interna...
 
Az24339344
Az24339344Az24339344
Az24339344
 
G04433953
G04433953G04433953
G04433953
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
 
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
 

Similar to New Research Articles 2020 June Issue International Journal on Cryptography and Information Security (IJCIS)

September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing sipij
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processingsipij
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processingsipij
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processingsipij
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...IJNSA Journal
 
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
 New Research Articles - 2018 November Issue- Advanced Computing: An Internat... New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...acijjournal
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Zac Darcy
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
 

Similar to New Research Articles 2020 June Issue International Journal on Cryptography and Information Security (IJCIS) (20)

September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processing
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
 New Research Articles - 2018 November Issue- Advanced Computing: An Internat... New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
New Research Articles - 2018 November Issue- Advanced Computing: An Internat...
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its Applications
 
Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

New Research Articles 2020 June Issue International Journal on Cryptography and Information Security (IJCIS)

  • 1. International Journal on Cryptography and Information Security (IJCIS) ISSN: 1839 ~ 8626 http://wireilla.com/ijcis/index.html Current Issue: June 2020, Volume 10, Number 2 https://wireilla.com/ijcis/vol10.html
  • 2. Paper -01 SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE Santosh Mutnuru, Sweeti Kumari Sah and S. Y Pavan Kumar Eastern Michigan University, USA ABSTRACT Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption- based algorithm has never been adequately studied. This paper introduces a new selective encryption- based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique and how it can achieve security and integrity for multimedia data over traditional encryption technique. KEYWORDS multimedia security, selective encryption; DCT compression; cipher image For More Details: https://wireilla.com/ijcis/abstract/10220ijcis01.html Volume Link: https://wireilla.com/papers/ijcis/V10N2/10220ijcis01.pdf
  • 3. REFERENCES [1] Sesha Pallavi Indrakanti and P.S.Avadhani, “Permutation based image encryption technique,” International Journal of Computer Applications, vol. 28– No.8, August 2011, pp. 45-47. [2] Sukalyan Som & Sayani Sen, (2013) “A Non-adaptive Partial Encryption of Grayscale Images based on Chaos”, Procedia Technology, vol. 10, pp. 663-671. [3] Mutnuru, S., PhD. (2016). The role of internal controls on employees' engagement in small organizations. JournalofBusinessStudiesQuarterly,7(4),102-114.Retrievedfrom http://search.proquest.com/docview/1807472170?accountid=35812 [4] P.R. Sankpal, P.A. Vijaya, "Image Encryption Using Chaotic Maps: A Survey", 2014 Fifth International Conference on Signal and Image Processing (ICSIP), Karnataka (India), pp. 102-107, 8- 10 Jan. 2014. DOI:10.1109/ICSIP.2014.80 [5] Kundankumar Rameshwar Saraf, Vishal Prakash Jagtap and Amit Kumar Mishra, “Text and Image Encryption Decryption Using Advanced Encryption Standard,” IJETTCS, vol. 3, June 2014, pp. 118- 126. [6] GĂśVENOÄžLU, E , RAZBONYALI, C . (2019). The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm. El-Cezeri Journal of Science and Engineering , 6 (3) , 668-680 . DOI: 10.31202/ecjse.571030 [7] Deepti C. Gavankar, C. Madhumita, and Suhas J. Lawand, “Secure Real Time Remote Video Monitoring Using Selective Encryption”, IEEE paper, 2012, pp. 453-457. [8] Tieyu Zhao, Qiwen Ran & Yingying Chi, (2015) “Image encryption based on nonlinear encryption system and public-key cryptography”, Optics Communications, vol 338, pp. 64-72. [9] A. Alfalou, C. Brosseau & N. Abdallah, (2015) “Simultaneous compression and encryption of color video images”, Optics Communications, vol 338, pp. 371-379. [10]R. Gupta, A. Aggarwal & S.K. Pal, “Design and Analysis of New Shuffle Encryption Schemes for Multimedia”, Defence Science Journal, Vol. 62, No. 3, May 2012, pp.159-166. [11]P. Maggo, Dr R.S. Chhillar, “Security of Multimedia Data: A Review Paper on various Image Security Algorithms”, National Conference on Advanced Computing Technologies, Vol. 2, March 2013,pp. 852-857. [12]Pavithra. C and Vinod. B. Durdi, “Analization and Comparison of Selective Encryption Algorithms with Full Encryption for Wireless Networks”, International Journal of Engineering Trends and Technology (IJETT), vol. 4 Issue 5,May 2013. [13]Droogenbroeck, Marc & Benedett, Raphal. (2002). Techniques For A Selective Encryption Of Uncompressed And Compressed images.
  • 4. Paper -02 TOWARDS A DEEPER NTRU ANALYSIS: A MULTI MODAL ANALYSIS Chuck Easttom1 , Anas Ibrahim2 , Alexander Chefranov3 , Izzat Alsmadi4 and Richard Hansen5 1 Adjunct Georgetown University and University of Dallas 2&3 Eastern Mediterranean University 4 Texas A&M University 5 Capitol Technology University ABSTRACT NTRU is being considered as part of the NIST quantum resistant cryptography standard. While NIST has received substantial attention in the literature, more analysis is needed. This current study uses a unique approach. The team of researchers divided into -sub-teams. Each is using a separate analysis technique on NTRU. Then the diverse -sub-teams' work was brought together into a single cohesive statistical analysis to provide well-founded conclusions regarding NTRU. KEYWORDS NTRU, NTRU Encrypt, Post Quantum Cryptography, Quantum Resistant Cryptography For More Details: https://wireilla.com/ijcis/abstract/10220ijcis02.html Volume Link: https://wireilla.com/papers/ijcis/V10N2/10220ijcis02.pdf
  • 5. REFERENCES [1] Hoffstein, J., Pipher, J., & Silverman, J. H. An introduction to mathematical cryptography. New York City, New York: Springer. 2014. [2] Nayak, D. R., Nanda, A. K., Awasthi, P., & Kumar, L. (2015). Multiple private keys with NTRU cryptosystem. IJRCCT, vol. 4, no. 3,pp. 250-255. 2015. [3] Peikert, C. A decade of lattice cryptography. Foundations and Trends in Theoretical Computer Science, vol. 10, no., pp. 283-424. 2016. [4] .Fluhrer, S.R.Quantum Cryptanalysis of NTRU. IACR cryptology ePrint Archive, 2015, p.676. 2015. [5] Jeong, S., Park, K. and Park, Y. Quantum resistant NTRU-based key distribution scheme for SIP. In 2018 International Conference on Electronics, Information, and Communication (ICEIC) (pp. 1-2). IEEE. 2018. [6] Kuznetsov, A., Kiian, A., Lutsenko, M., Chepurko, I., & Kavun, S. Code-based cryptosystems from NIST PQC. In 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) (pp. 282-287). IEEE. 2018. [7] Alagic, G., Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Liu, Y.K., Miller, C., Moody, D., Peralta, R. and Perlner, R.. Status report on the first round of the NIST post-quantum cryptography standardization process. US Department of Commerce, National Institute of Standards and Technology. 2019. [8] Bernstein, Daniel J., Chitchanok C., Tanja L., and Van Vredendaal, C.. "NTRU Prime." IACR Cryptology ePrint Archive 2016 (2016): 461. [9] Singh, S. and Padhye, S., 2017. Cryptanalysis of NTRU with n Public Keys. In 2017 ISEA Asia Security and Privacy (ISEASP) (pp. 1-6). IEEE [10] Liu, Z., Pan, Y. and Zhang, Z., 2019, May. Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS’15. In International Conference on Post-Quantum Cryptography (pp. 153- 166). Springer, Cham. [11] Huerta, C.E.V., 2019. A Description of the NTRU Cryptosystem and Its Cryptanalysis via the LL Algorithm (Doctoral dissertation, San Diego State University). [12] Albrecht, M., Bai, S. and Ducas, L., 2016, August. A subfield lattice attack on overstretched NTRU assumptions. In Annual International Cryptology Conference (pp. 153-178). Springer, Berlin, Heidelberg. [13] Kirchner, P. and Fouque, P.A., 2017, April. Revisiting lattice attacks on overstretched NTRU parameters. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 3-26). Springer, Cham. [14] Duong, D.H., Yasuda, M. and Takagi, T., 2017, November. Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU. In International Conference on Information Security (pp. 79-91). Springer, Cham.
  • 6. [15] Bernstein, D.J., Chuengsatiansup, C., Lange, T. and van Vredendaal, C. NTRU Prime: reducing attack surface at low cost. In International Conference on Selected Areas in Cryptography.pp. 235- 260. Springer, Cham. 2017 [16] Albrecht, M.R., Curtis, B.R., Deo, A., Davidson, A., Player, R., Postlethwaite, E.W., Virdia, F. and Wunderer, T. September. Estimate all the {LWE, NTRU} schemes!. In International Conference on Security and Cryptography for Networks (pp. 351-367). Springer, Cham. 2018. [17] Valluri, M.R., 2018. Cryptanalysis of Xinyu et al.'s NTRU-lattice based key exchange protocol. Journal of Information and Optimization Sciences, 39(2), pp.475-479. [18] Huerta, C.E.V., A Description of the NTRU Cryptosystem and Its Cryptanalysis via the LL Algorithm (Doctoral dissertation, San Diego State University). 2019. [19] Yang, Z., Fu, S., Qu, L. and Li, C., 2018. A lower dimension lattice attack on NTRU. Science China Information Sciences, vol. 61, no. 5, pp. 059101. [20] Shoup, Victor. "NTL: A library for doing number theory. http." 2019. [21] Yang, Z., Shaojing, F., Longjiang, Q., Chao, L.. A Lower Dimension Lattice Attack on NTRU Supplementary File http://scis.scichina.com/en/2018/059101-supplementary.pdf. 2017. [22] Chen, Y., & Nguyen, P. Q. (2011, December). BKZ 2.0: Better lattice security estimates. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 1-20). Springer, Berlin, Heidelberg. [23] Easttom, C., 2019, January. An Analysis of Leading Lattice-Based Asymmetric Cryptographic Primitives. IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0811-0818. 2019 [24] Easttom II, W.C., 2018. A Comparative Study of Lattice Based Algorithms for Post Quantum Computing (Doctoral dissertation, Capitol Technology University). 2018. [25] Pironio, S., AcĂ­n, A., Massar, S., de La Giroday, A. B., Matsukevich, D. N., Maunz, P., ... & Monroe, C. (2010). Random numbers certified by Bell’s theorem. Nature, 464(7291), 1021-1024. [26] Simion, E. (2015). The relevance of statistical tests in cryptography. IEEE Security & Privacy, 13(1), 66-70. [27] Tadaki, K., & Doi, N. (2015). Cryptography and algorithmic randomness. Theory of Computing Systems, 56(3), 544-580. [28] Georgescu, C., Petrescu-Nita, A., Simion, E., & Toma, A. (2017). NIST Randomness Tests (in) dependence. IACR Cryptology ePrint Archive, 2017, 336. [29] Sulak, F., UÄžUZ, M., Kocak, O., & DoÄźanaksoY, A. (2017). On the independence of statistical randomness tests included in the NIST test suite. Turkish Journal of Electrical Engineering & Computer Sciences, 25(5), 3673-3683. [30] Balasubramanian, K. Experiments with the Cryptool Software. Algorithmic Strategies for Solving Complex Problems in Cryptography, pp. 186-194. 2018.
  • 7. [31] Duan, G., Wang, Y., Li, M., Sheng, Y., Wang, J., & Zhang, S. Research on Techniques and Methods of Developing Cryptography Virtual Laboratory. International Journal of Performability Engineering, vol. 13, no. 8, pp. 1371-1381. 2017. AUTHORS Chuck Easttom, D.Sc., Ph.D. IEEE Senior Member, ACM Senior Member, Distinguished Speaker of the ACM and IEEE. Adjunct lecturer at Georgetown University and Adjunct professor at University of Dallas Anas Ibrahim, PhD Researcher at Eastern Mediterranean University Alexander Chefranov Associate Professor at Eastern Mediterranean University Izzat Alsmadi, Ph.D. Assistant Professor at Texas A&M University IEEE Senior Member Richard Hansen Professor of Practice Capitol Technology University