Use of Homomorphic Transform in Encryption

Ankit Vishnoi, Alok Agarwal, A. Prasad, M. Prateek
{"title":"Use of Homomorphic Transform in Encryption","authors":"Ankit Vishnoi, Alok Agarwal, A. Prasad, M. Prateek","doi":"10.1109/CSITSS54238.2021.9683207","DOIUrl":null,"url":null,"abstract":"Data security is an important aspect for datasets of every size and type. Data security refers to provide a secure environment to datasets, web-based datasets, and preventing unauthorized access to the data. The key data security technique is encryption, where the digital data is encrypted. As result, the unauthorized person or hacker gets unreadable data. The computing process generates data that is encrypted by the key and can be decrypted with the correct key only. In this research, an approach is proposed of using transforms to provide a better cryptography process to secure data even during communication. The result of the proposed method indicates that in any condition, the ciphertext will always be the same for each input, but the encryption key will change each time, which makes this encryption complex to break.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSITSS54238.2021.9683207","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Data security is an important aspect for datasets of every size and type. Data security refers to provide a secure environment to datasets, web-based datasets, and preventing unauthorized access to the data. The key data security technique is encryption, where the digital data is encrypted. As result, the unauthorized person or hacker gets unreadable data. The computing process generates data that is encrypted by the key and can be decrypted with the correct key only. In this research, an approach is proposed of using transforms to provide a better cryptography process to secure data even during communication. The result of the proposed method indicates that in any condition, the ciphertext will always be the same for each input, but the encryption key will change each time, which makes this encryption complex to break.
同态变换在加密中的应用
对于各种大小和类型的数据集来说,数据安全性是一个重要的方面。数据安全是指为数据集、基于web的数据集提供安全的环境,防止对数据的未经授权的访问。数据安全的关键技术是加密,即对数字数据进行加密。结果,未经授权的人或黑客获得了不可读的数据。计算过程生成的数据由密钥加密,只有使用正确的密钥才能解密。在本研究中,提出了一种使用转换来提供更好的加密过程的方法,即使在通信过程中也可以保护数据。该方法的结果表明,在任何情况下,每次输入的密文都是相同的,但每次输入的加密密钥都会发生变化,这使得该加密很难破解。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信