{"title":"一种涉及同态变换的加密方法","authors":"Ankit Vishnoi, A. Aggarwal, A. Prasad, M. Prateek","doi":"10.1109/CENTCON52345.2021.9688040","DOIUrl":null,"url":null,"abstract":"Data security is an important aspect for datasets of every size and type. Data security refers to provide a secure environment to datasets, web-based datasets, and preventing unauthorized access to the data. The key data security technique is encryption, where the digital data is encrypted. As result, the unauthorized person or hacker gets unreadable data. The computing process generates data that is encrypted by the key and can be decrypted with the correct key only. In this research, an approach is proposed of using transforms to provide a better cryptography process to secure data even during communication. The result of the proposed method indicates that in any condition, the ciphertext will always be the same for each input, but the encryption key will change each time, which makes this encryption complex to break","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"An Encryption Method Involving Homomorphic Transform\",\"authors\":\"Ankit Vishnoi, A. Aggarwal, A. Prasad, M. Prateek\",\"doi\":\"10.1109/CENTCON52345.2021.9688040\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data security is an important aspect for datasets of every size and type. Data security refers to provide a secure environment to datasets, web-based datasets, and preventing unauthorized access to the data. The key data security technique is encryption, where the digital data is encrypted. As result, the unauthorized person or hacker gets unreadable data. The computing process generates data that is encrypted by the key and can be decrypted with the correct key only. In this research, an approach is proposed of using transforms to provide a better cryptography process to secure data even during communication. The result of the proposed method indicates that in any condition, the ciphertext will always be the same for each input, but the encryption key will change each time, which makes this encryption complex to break\",\"PeriodicalId\":103865,\"journal\":{\"name\":\"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CENTCON52345.2021.9688040\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CENTCON52345.2021.9688040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Encryption Method Involving Homomorphic Transform
Data security is an important aspect for datasets of every size and type. Data security refers to provide a secure environment to datasets, web-based datasets, and preventing unauthorized access to the data. The key data security technique is encryption, where the digital data is encrypted. As result, the unauthorized person or hacker gets unreadable data. The computing process generates data that is encrypted by the key and can be decrypted with the correct key only. In this research, an approach is proposed of using transforms to provide a better cryptography process to secure data even during communication. The result of the proposed method indicates that in any condition, the ciphertext will always be the same for each input, but the encryption key will change each time, which makes this encryption complex to break