This paper presents cryptography which is the science of encryption and decryption to protect fingerprint that can be transmitted from sender to receiver. This security approach (cryptography) can also be applicable to other biometric traits like face, iris, retina and palm print. The significant of this protective medium is to prevent intruders or attacker to easily perceive the presence of fingerprint images. The method that was utilized for implementation of this cryptographic security approach for fingerprint verification System was achieved through Elliptic Curve Cryptography and Hill Cipher Algorithm. An elliptic Curve Function was defined and its domain parameters were used to generate self invertible key matrix that was used for the encryption and decryption process of the biometric images (Fingerprint, Face and Ear ) The security approach was also improved by ensuring that the decryption can only be done through secret key. After decryption, fingerprint verification was done by extracting and matching distinct feature (ridges) from template fingerprint and distinct feature from input fingerprint. The result obtained from demonstration of the cryptographic approach allows end users to load fingerprint image, encrypt it at sending end. At receiver end, end user can decrypt the fingerprint image. Image enhancement was later done before authentication through extraction and matching of distinct features. This model will prevent destruction and manipulation of stored fingerprint image. Authentication can also be accomplished through biological traits instead of use of password that can be stolen or transferred to relative.
{"title":"Cryptographic Security Approach for Biometric Verification System","authors":"Akinribido C.T, Olabode O.O, Adetunmbi O.A, Adewumi Moradeke Grace","doi":"10.54105/ijcns.c7854.113223","DOIUrl":"https://doi.org/10.54105/ijcns.c7854.113223","url":null,"abstract":"This paper presents cryptography which is the science of encryption and decryption to protect fingerprint that can be transmitted from sender to receiver. This security approach (cryptography) can also be applicable to other biometric traits like face, iris, retina and palm print. The significant of this protective medium is to prevent intruders or attacker to easily perceive the presence of fingerprint images. The method that was utilized for implementation of this cryptographic security approach for fingerprint verification System was achieved through Elliptic Curve Cryptography and Hill Cipher Algorithm. An elliptic Curve Function was defined and its domain parameters were used to generate self invertible key matrix that was used for the encryption and decryption process of the biometric images (Fingerprint, Face and Ear ) The security approach was also improved by ensuring that the decryption can only be done through secret key. After decryption, fingerprint verification was done by extracting and matching distinct feature (ridges) from template fingerprint and distinct feature from input fingerprint. The result obtained from demonstration of the cryptographic approach allows end users to load fingerprint image, encrypt it at sending end. At receiver end, end user can decrypt the fingerprint image. Image enhancement was later done before authentication through extraction and matching of distinct features. This model will prevent destruction and manipulation of stored fingerprint image. Authentication can also be accomplished through biological traits instead of use of password that can be stolen or transferred to relative.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":" 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139140018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-30DOI: 10.54105/ijcns.a1425.113223
Dr. Kannan Balasubramanian
Arbitrary precision arithmetic, also known as bignum arithmetic, is a computational technique that allows programmers to perform arithmetic operations on numbers with significantly higher precision and magnitude than what is typically supported by the built-in numerical data types in programming languages. This technique is especially useful when working with extremely large or extremely precise numbers, such as in cryptography or scientific computations. Arbitrary precision arithmetic has many applications in the areas of Cryptography, Numerical Computation, Statistical Analysis, and High Precision measurements. For example, the calculation of the modulus in the RSA algorithm involves numbers with 1024-bit numbers and higher. An arithmetic calculation involving Multiplication and exponentiation of such numbers using Modulo arithmetic cannot be easily carried out in the existing programming Languages unless special software is provided. We can calculate the mathematical constant Pi to many thousand decimal places using the support provided in Programming Languages. Many programming languages provide built-in support for libraries for arbitrary precision arithmetic. We discuss the support provided in C/C++, Java and Python Languages with examples. Besides Programming Languages, Toolkits like Matlab and Sagemath also are used for scientific computation and special software support provided in these toolkits can enable arbitrary precision arithmetic. Most Programming Languages have support for floating-point arithmetic. We also discuss how arbitrary precision floating point arithmetic. can be supported in C/C++, Java, and Python. In addition, we discuss support for arbitrary precision integer arithmetic in Ruby, Javascript and Matlab and support for arbitrary precision floating point arithmetic in the Perl Language. Finally, we provide an example of computing the constant Pi to many decimal places using the sagemath tool.
{"title":"Software Support for Arbitrary Precision Arithmetic in Programming Languages","authors":"Dr. Kannan Balasubramanian","doi":"10.54105/ijcns.a1425.113223","DOIUrl":"https://doi.org/10.54105/ijcns.a1425.113223","url":null,"abstract":"Arbitrary precision arithmetic, also known as bignum arithmetic, is a computational technique that allows programmers to perform arithmetic operations on numbers with significantly higher precision and magnitude than what is typically supported by the built-in numerical data types in programming languages. This technique is especially useful when working with extremely large or extremely precise numbers, such as in cryptography or scientific computations. Arbitrary precision arithmetic has many applications in the areas of Cryptography, Numerical Computation, Statistical Analysis, and High Precision measurements. For example, the calculation of the modulus in the RSA algorithm involves numbers with 1024-bit numbers and higher. An arithmetic calculation involving Multiplication and exponentiation of such numbers using Modulo arithmetic cannot be easily carried out in the existing programming Languages unless special software is provided. We can calculate the mathematical constant Pi to many thousand decimal places using the support provided in Programming Languages. Many programming languages provide built-in support for libraries for arbitrary precision arithmetic. We discuss the support provided in C/C++, Java and Python Languages with examples. Besides Programming Languages, Toolkits like Matlab and Sagemath also are used for scientific computation and special software support provided in these toolkits can enable arbitrary precision arithmetic. Most Programming Languages have support for floating-point arithmetic. We also discuss how arbitrary precision floating point arithmetic. can be supported in C/C++, Java, and Python. In addition, we discuss support for arbitrary precision integer arithmetic in Ruby, Javascript and Matlab and support for arbitrary precision floating point arithmetic in the Perl Language. Finally, we provide an example of computing the constant Pi to many decimal places using the sagemath tool.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"10 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139196699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-30DOI: 10.54105/ijcns.d4090.053123
Adesh Mukati
The recent ransomware attack on AIIMS (All India Institute of Medical Sciences) has highlighted internal system weaknesses in the healthcare sector, and blockchain technology has emerged as a potential solution to improve security and reduce the risk of future attacks. The decentralized blockchain technology makes it much more difficult for ransomware attackers to focus on a single point of failure. Additionally, blockchain technology provides recipients and data providers with the reassurance that their data has not been changed, enabling enterprises to have confidence and assurance in the integrity of their sensitive data. The sharing of data also restores control of data to its owners. The information is dispersed so that no one company can control it, yet it is still organized around the owner. Thamrin and Xu's research paper proposes a framework for healthcare data storage that includes hospital, city, and state blockchain networks. The proposed system uses a private cloud, but the researchers recommend a hybrid cloud for improved efficiency and adaptability. This innovative approach has the potential to enhance healthcare systems' data security, privacy, and accountability. However, a comprehensive analysis of the problem and an assessment of the potential effectiveness of blockchain technology is necessary before implementing any solutions.
{"title":"Blockchain Technology In Healthcare Services","authors":"Adesh Mukati","doi":"10.54105/ijcns.d4090.053123","DOIUrl":"https://doi.org/10.54105/ijcns.d4090.053123","url":null,"abstract":"The recent ransomware attack on AIIMS (All India Institute of Medical Sciences) has highlighted internal system weaknesses in the healthcare sector, and blockchain technology has emerged as a potential solution to improve security and reduce the risk of future attacks. The decentralized blockchain technology makes it much more difficult for ransomware attackers to focus on a single point of failure. Additionally, blockchain technology provides recipients and data providers with the reassurance that their data has not been changed, enabling enterprises to have confidence and assurance in the integrity of their sensitive data. The sharing of data also restores control of data to its owners. The information is dispersed so that no one company can control it, yet it is still organized around the owner. Thamrin and Xu's research paper proposes a framework for healthcare data storage that includes hospital, city, and state blockchain networks. The proposed system uses a private cloud, but the researchers recommend a hybrid cloud for improved efficiency and adaptability. This innovative approach has the potential to enhance healthcare systems' data security, privacy, and accountability. However, a comprehensive analysis of the problem and an assessment of the potential effectiveness of blockchain technology is necessary before implementing any solutions.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129142253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-30DOI: 10.54105/ijcns.f3677.053123
Yaser M.A. Abualkas, D. Bhaskari
Data science may be used to detect, prevent, and address ever-evolving cybersecurity risks. CSDS is a fast developing field. When it comes to cybersecurity, CSDS emphasises the use of data, concentrates on generating warnings that are specific to a particular threat and uses inferential methods to categorise user behaviour in the process of attempting to enhance cybersecurity operations. Data science is at the heart of recent developments in cybersecurity technology and operations. Automation and intelligence in security systems are only possible through the extraction of patterns and insights from cybersecurity data, as well as the creation of data-driven models that reflect those patterns and insights An attempt is made in this work to describe the various data-driven research approaches with a focus on security. In accordance with the phases of the technique, each work that anticipates cyber-incidents is thoroughly investigated to create an automated and intelligent security system.
{"title":"Methodologies for Predicting Cybersecurity Incidents","authors":"Yaser M.A. Abualkas, D. Bhaskari","doi":"10.54105/ijcns.f3677.053123","DOIUrl":"https://doi.org/10.54105/ijcns.f3677.053123","url":null,"abstract":"Data science may be used to detect, prevent, and address ever-evolving cybersecurity risks. CSDS is a fast developing field. When it comes to cybersecurity, CSDS emphasises the use of data, concentrates on generating warnings that are specific to a particular threat and uses inferential methods to categorise user behaviour in the process of attempting to enhance cybersecurity operations. Data science is at the heart of recent developments in cybersecurity technology and operations. Automation and intelligence in security systems are only possible through the extraction of patterns and insights from cybersecurity data, as well as the creation of data-driven models that reflect those patterns and insights An attempt is made in this work to describe the various data-driven research approaches with a focus on security. In accordance with the phases of the technique, each work that anticipates cyber-incidents is thoroughly investigated to create an automated and intelligent security system.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127645866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-30DOI: 10.54105/ijcns.b1421.112222
Dr. Kannan Balasubramanian, M. Arun, Dr. K. R. Sekar
The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the difficulty of factoring the modulus calculated by multiplying two large prime numbers. The usefulness of the RSA public key algorithm lies in using one key for encryption and another key for decryption. However, a poor choice of the keys used in encryption and decryption can affect the security of the RSA cryptosystem. Many proposals have been made to modify the RSA cryptosystem in such a way that the attacks on the RSA cryptosystem can be overcome. In this article, we propose concealing the publicly disclosed parameters, the encryption key and the common modulus of the RSA cryptosystem by altering the values sent publicly. The values sent publicly are different from the one used in the algorithm which conceals the actual parameters to others. The implementation of this idea uses two different algorithms and randomly choosing between the algorithms. The choice of the algorithm is done using a random number generator and this choice of the algorithm has to be communicated so the decryptor uses the correct algorithm to decrypt the encrypted data. Finally we explore a faster way to implement the modular exponentiation algorithm used in the RSA encryption and decryption.
{"title":"An Improved RSA Algorithm for Enhanced Security","authors":"Dr. Kannan Balasubramanian, M. Arun, Dr. K. R. Sekar","doi":"10.54105/ijcns.b1421.112222","DOIUrl":"https://doi.org/10.54105/ijcns.b1421.112222","url":null,"abstract":"The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the difficulty of factoring the modulus calculated by multiplying two large prime numbers. The usefulness of the RSA public key algorithm lies in using one key for encryption and another key for decryption. However, a poor choice of the keys used in encryption and decryption can affect the security of the RSA cryptosystem. Many proposals have been made to modify the RSA cryptosystem in such a way that the attacks on the RSA cryptosystem can be overcome. In this article, we propose concealing the publicly disclosed parameters, the encryption key and the common modulus of the RSA cryptosystem by altering the values sent publicly. The values sent publicly are different from the one used in the algorithm which conceals the actual parameters to others. The implementation of this idea uses two different algorithms and randomly choosing between the algorithms. The choice of the algorithm is done using a random number generator and this choice of the algorithm has to be communicated so the decryptor uses the correct algorithm to decrypt the encrypted data. Finally we explore a faster way to implement the modular exponentiation algorithm used in the RSA encryption and decryption.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128964236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-30DOI: 10.54105/ijcns.b3604.112222
Adesh Mukati, D. Prakash
centralized database-based Central Bank Digital Currency (CBDC) system's vulnerability to cyberattacks and data leakage is a major concern. Any data leak can lead to large financial losses, irreversible reputational harm, and a decline in user confidence. To protect user information, the Reserve Bank of India has underlined the significance of a strong Data Leakage Prevention (DLP) system. While current incidents have demonstrated that the measures were insufficient to meet the standards, DLP may not be enough to defend CBDCs on its own. Incorporating Zero-Knowledge Proofs (ZKPs) and differential privacy tools into DLP solutions can improve their robustness and effectiveness. There is no one-size-fits-all solution for preventing data leakage, different solutions may be more effective in different scenarios. It's always a good idea to assess an organization's or system's specific needs and requirements before deciding on the best solution. It is also important to remember that there is no such thing as absolute security, and the possibility of zero-day attacks is always there. It is essential to continuously monitor and enhance security measures to stay ahead of new threats. To preserve their Central Bank Digital Currency systems and data, financial institutions and central banks must continue to be proactive and vigilant.
{"title":"The Role of Data Leakage Prevention System in CBDC","authors":"Adesh Mukati, D. Prakash","doi":"10.54105/ijcns.b3604.112222","DOIUrl":"https://doi.org/10.54105/ijcns.b3604.112222","url":null,"abstract":"centralized database-based Central Bank Digital Currency (CBDC) system's vulnerability to cyberattacks and data leakage is a major concern. Any data leak can lead to large financial losses, irreversible reputational harm, and a decline in user confidence. To protect user information, the Reserve Bank of India has underlined the significance of a strong Data Leakage Prevention (DLP) system. While current incidents have demonstrated that the measures were insufficient to meet the standards, DLP may not be enough to defend CBDCs on its own. Incorporating Zero-Knowledge Proofs (ZKPs) and differential privacy tools into DLP solutions can improve their robustness and effectiveness. There is no one-size-fits-all solution for preventing data leakage, different solutions may be more effective in different scenarios. It's always a good idea to assess an organization's or system's specific needs and requirements before deciding on the best solution. It is also important to remember that there is no such thing as absolute security, and the possibility of zero-day attacks is always there. It is essential to continuously monitor and enhance security measures to stay ahead of new threats. To preserve their Central Bank Digital Currency systems and data, financial institutions and central banks must continue to be proactive and vigilant.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130912226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.35940/IJCNS.B1411.111221
S. Raj, Megha Jain, P. Chouksey
Massive volumes of network traffic & data are generated by common technology including the Internet of Things, cloud computing & social networking. Intrusion Detection Systems are therefore required to track the network which dynamically analyses incoming traffic. The purpose of the IDS is to carry out attacks inspection or provide security management with desirable help along with intrusion data. To date, several approaches to intrusion detection have been suggested to anticipate network malicious traffic. The NSL-KDD dataset is being applied in the paper to test intrusion detection machine learning algorithms. We research the potential viability of ELM by evaluating the advantages and disadvantages of ELM. In the preceding part on this issue, we noted that ELM does not degrade the generalisation potential in the expectation sense by selecting the activation function correctly. In this paper, we initiate a separate analysis & demonstrate that the randomness of ELM often contributes to some negative effects. For this reason, we have employed a new technique of machine learning for overcoming the problems of ELM by using the Categorical Boosting technique (CATBoost).
{"title":"A Network Intrusion Detection System Based on Categorical Boosting Technique using NSL-KDD","authors":"S. Raj, Megha Jain, P. Chouksey","doi":"10.35940/IJCNS.B1411.111221","DOIUrl":"https://doi.org/10.35940/IJCNS.B1411.111221","url":null,"abstract":"Massive volumes of network traffic & data are generated by common technology including the Internet of Things, cloud computing & social networking. Intrusion Detection Systems are therefore required to track the network which dynamically analyses incoming traffic. The purpose of the IDS is to carry out attacks inspection or provide security management with desirable help along with intrusion data. To date, several approaches to intrusion detection have been suggested to anticipate network malicious traffic. The NSL-KDD dataset is being applied in the paper to test intrusion detection machine learning algorithms. We research the potential viability of ELM by evaluating the advantages and disadvantages of ELM. In the preceding part on this issue, we noted that ELM does not degrade the generalisation potential in the expectation sense by selecting the activation function correctly. In this paper, we initiate a separate analysis & demonstrate that the randomness of ELM often contributes to some negative effects. For this reason, we have employed a new technique of machine learning for overcoming the problems of ELM by using the Categorical Boosting technique (CATBoost).","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121249428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.35940/ijcns.a1408.111221
Abhishek Balamurugan, S. R, S. J, S. K
In this project, we are planning to create a strong robust calculation for executing cash in higher level security reason with high acknowledgment rates in a shifting environment. To begin with, Haar cascade based calculation has been connected for quick and basic confront location from the input picture. The confront picture is at that point being changed over into grayscale picture. After that, the iris, eyebrows, nose, mouth of candidates are extricated from the escalated valleys from the recognized confront.
{"title":"Secure Online Transaction using Iris","authors":"Abhishek Balamurugan, S. R, S. J, S. K","doi":"10.35940/ijcns.a1408.111221","DOIUrl":"https://doi.org/10.35940/ijcns.a1408.111221","url":null,"abstract":"In this project, we are planning to create a strong robust calculation for executing cash in higher level security reason with high acknowledgment rates in a shifting environment. To begin with, Haar cascade based calculation has been connected for quick and basic confront location from the input picture. The confront picture is at that point being changed over into grayscale picture. After that, the iris, eyebrows, nose, mouth of candidates are extricated from the escalated valleys from the recognized confront.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130060518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-10DOI: 10.35940/IJCNS.A1402.051121
H. Kaur, Amandeep Kaur Prof.
Cryptography is a key element in establishing trust and enabling services in the digital world. It is represented in a ways that are not accessible to human users. Hence, humans are left out the trust and security in the digital world. Cryptography is necessary in modern communication protocols and to many digital services. A primitive or protocol should be defined to reach the security goal. Beside the introduction part this paper represents the types of cryptography, algorithm of cryptography and techniques of cryptography and the interaction between Government and cryptography.
{"title":"Cryptography in Cloud Computing","authors":"H. Kaur, Amandeep Kaur Prof.","doi":"10.35940/IJCNS.A1402.051121","DOIUrl":"https://doi.org/10.35940/IJCNS.A1402.051121","url":null,"abstract":"Cryptography is a key element in establishing trust and enabling services in the digital world. It is represented in a ways that are not accessible to human users. Hence, humans are left out the trust and security in the digital world. Cryptography is necessary in modern communication protocols and to many digital services. A primitive or protocol should be defined to reach the security goal. Beside the introduction part this paper represents the types of cryptography, algorithm of cryptography and techniques of cryptography and the interaction between Government and cryptography.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129930562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}