Rajendra P. Pandey, Rahul Pawar, Girija Shankar Sahoo
{"title":"关于使用应用密码学防止未经授权访问的调查","authors":"Rajendra P. Pandey, Rahul Pawar, Girija Shankar Sahoo","doi":"10.1109/ICOCWC60930.2024.10470475","DOIUrl":null,"url":null,"abstract":"this paper offers an investigation into the usage of applied cryptography for stopping unauthorized get entry. After introducing the simple cryptography standards, an evaluation of various cryptographic protocols is mentioned. Furthermore, capacity programs for applying cryptography are mentioned, together with authentication protocols, digital signature schemes, encryption algorithms, and get right of entry to manage systems. The paper additionally examines the current traits of the use of more robust cryptography so that it will, in addition, enhance safety systems. A comparison of numerous safety systems is offered, and the feasible advantages and downsides of a more potent cryptography version are discussed. Ultimately, the consequences of using more robust cryptography consideration close to criminal and privacy issues.","PeriodicalId":518901,"journal":{"name":"2024 International Conference on Optimization Computing and Wireless Communication (ICOCWC)","volume":"76 30","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Investigation of the Use of Applied Cryptography for Preventing Unauthorized Access\",\"authors\":\"Rajendra P. Pandey, Rahul Pawar, Girija Shankar Sahoo\",\"doi\":\"10.1109/ICOCWC60930.2024.10470475\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"this paper offers an investigation into the usage of applied cryptography for stopping unauthorized get entry. After introducing the simple cryptography standards, an evaluation of various cryptographic protocols is mentioned. Furthermore, capacity programs for applying cryptography are mentioned, together with authentication protocols, digital signature schemes, encryption algorithms, and get right of entry to manage systems. The paper additionally examines the current traits of the use of more robust cryptography so that it will, in addition, enhance safety systems. A comparison of numerous safety systems is offered, and the feasible advantages and downsides of a more potent cryptography version are discussed. Ultimately, the consequences of using more robust cryptography consideration close to criminal and privacy issues.\",\"PeriodicalId\":518901,\"journal\":{\"name\":\"2024 International Conference on Optimization Computing and Wireless Communication (ICOCWC)\",\"volume\":\"76 30\",\"pages\":\"1-6\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-01-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2024 International Conference on Optimization Computing and Wireless Communication (ICOCWC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOCWC60930.2024.10470475\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2024 International Conference on Optimization Computing and Wireless Communication (ICOCWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOCWC60930.2024.10470475","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Investigation of the Use of Applied Cryptography for Preventing Unauthorized Access
this paper offers an investigation into the usage of applied cryptography for stopping unauthorized get entry. After introducing the simple cryptography standards, an evaluation of various cryptographic protocols is mentioned. Furthermore, capacity programs for applying cryptography are mentioned, together with authentication protocols, digital signature schemes, encryption algorithms, and get right of entry to manage systems. The paper additionally examines the current traits of the use of more robust cryptography so that it will, in addition, enhance safety systems. A comparison of numerous safety systems is offered, and the feasible advantages and downsides of a more potent cryptography version are discussed. Ultimately, the consequences of using more robust cryptography consideration close to criminal and privacy issues.