Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cryptography

Examining Fractal Image Processing and Analysis
Art of secret writing.
Published in Chapter:
A Review on Chaos-Based Image Encryption Using Fractal Function
Anandkumar R. (Pondicherry Engineering College, India) and Kalpana R. (Pondicherry Engineering College, India)
Copyright: © 2020 |Pages: 15
DOI: 10.4018/978-1-7998-0066-8.ch002
Abstract
The tremendous development in the field of telecommunication and computer technologies leads to the preference of transferring information as a digital data. In this transformation of information, cryptography helps in encrypting/decrypting digital data, so that intruders will not be able to sniff the highly confidential information. Most information is transferred as a digital image, where image encryption is done by scrambling the original pixels of the image, and hence, the correlation between the original pixel and scrambled pixel differs leading to confusion to unauthorized accesses. Chaotic image encryption is one of the recent technologies in cryptosystems, where a pseudorandom and irregular key is used for encryption/decryption, as the key suffers a great change if some initial conditions are altered, leading to highly secured transmission in the network. In this chapter, a detailed survey is conducted on chaotic image encryption using fractal function, in which fractal key is used for encryption and decryption of an image.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Securing the Internet of Things Applications Using Blockchain Technology in the Manufacturing Industry
Blockchain’s transactions achieve validity, trust, and finality based on cryptographic proofs and underlying mathematical computations between various trading partners.
Full Text Chapter Download: US $37.50 Add to Cart
Identification Protocols
The science and study of secret writing.
Full Text Chapter Download: US $37.50 Add to Cart
Advancements in Blockchain Technology With the Use of Quantum Blockchain and Non-Fungible Tokens
A mechanism of securing the transactions by encrypting the data using different algorithm which can only be decoded by the intended user.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Computing Environments
A mathematical system of encryption by which codes are created using a key and cypher both of which are required to decipher, decode, or break the encryption so that the information can be read by human or machines.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy on Personalized Multi-Agent System
The science of information security with the study of mathematical techniques. Cryptography is the scrambling of plaintext into ciphertext (called encryption) and then back again (called decryption) and has the ability to securely store and transfer sensitive information. The goal of cryptography is to address the four areas of confidentiality, integrity, non-repudiation and authentication in both theory and practice.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain and IoT-Based Diary Supply Chain Management System for Sri Lanka
The practice and study of secure communication techniques in the presence of third parties known as adversaries.
Full Text Chapter Download: US $37.50 Add to Cart
Steganography Using Biometrics
Cryptography is a technique to secure a communication. It converts the message into some meaning text (cipher) using encryption algorithm, so that no one can read that massage without knowing the decryption algorithm. Depending on the secret key used in the algorithm it is divided into two categories: symmetric - if one key is used for encryption as well as decryption and asymmetric- if two different keys are used for encryption and decryption.
Full Text Chapter Download: US $37.50 Add to Cart
A Decentralized Privacy Preserving Healthcare Blockchain for IoT, Challenges, and Solutions
Blockchain’s transactions achieve validity, trust, and finality based on cryptographic proofs and underlying mathematical computations between various trading partners.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Watermarking
Cryptography is the process or skill of communicating in or deciphering secret writings or ciphers.
Full Text Chapter Download: US $37.50 Add to Cart
Cryptography and Blockchain Solutions for Security Protection of Internet of Things Applications
The art and science of keeping messages secure. Cryptography is different from steganography which is used to conceal a message by hiding it in such a way that the mere existence is obscured.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
A Formal Verification Centred Development Process for Security Protocols
The study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication.
Full Text Chapter Download: US $37.50 Add to Cart
A Blockchain-Based Robotic Process Automation Mechanism in Educational Setting
Also known as cryptology, it is the practice and study of techniques to ensure protect information and secure communications using codes such that only the intended recipient can read and process it.
Full Text Chapter Download: US $37.50 Add to Cart
Information Sharing for Manufacturing Supply Chain Management Based on Blockchain Technology
Blockchain’s transactions achieve validity, trust, and finality based on cryptographic proofs and underlying mathematical computations between various trading partners.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain-Based Secure Transactions
Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Agent Authentication and Authorization
The act of protecting data by encoding it, so that it can only be decoded by individuals who possess the key.
Full Text Chapter Download: US $37.50 Add to Cart
Biometrics in Cloud Computing
Biometric cryptosystems combine cryptography and biometrics to benefit from the strengths of both fields. In such systems while cryptography provides high and adjustable security levels, biometric brings in non-repudiation and eliminates the need of remember passwords or to carry token etc. cryptography does not become moribund and succumb to the vicissitudes of haute couture and coiffure, ciphers, hashing algorithms are data encryption will remain the under pinning of identification, authentication, protection and verification technologies.
Full Text Chapter Download: US $37.50 Add to Cart
Modern Crypto Systems in Next Generation Networks: Issues and Challenges
The discipline which embodies principles, means and methods for the transformation of data in order to hide its information content, prevent its undetected modification, prevent its unauthorized use or a combination thereof the study of transforming information in order to make it secure from unintended recipients.
Full Text Chapter Download: US $37.50 Add to Cart
Role of Blockchain Technology in Protecting a Cloud Architecture
Cryptography is the science and practice of secure communication techniques that protect information by transforming it into an unreadable format (ciphertext) using mathematical algorithms and encryption keys. Cryptography ensures the confidentiality, integrity, and authenticity of data and is widely used in securing digital communication, data storage, and online transactions.
Full Text Chapter Download: US $37.50 Add to Cart
Drivers of Sustainable Supply Chain Management Using Internet of Things-Based Blockchain Technology
Blockchain’s transactions achieve validity, trust, and finality based on cryptographic proofs and underlying mathematical computations between various trading partners.
Full Text Chapter Download: US $37.50 Add to Cart
Impact of Big Data on Security
It is the training and investigation of concealing data. It is once in a while called code; yet, this is not by any means a right name. It is the science used to endeavor to protect data mystery and present day cryptography is a blend of arithmetic, software engineering, and electrical designing. Cryptography is utilized as a part of ATM (bank) cards, PC passwords, and shopping on the web.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Cryptography
The study of techniques for secure communication using mathematical concepts.
Full Text Chapter Download: US $37.50 Add to Cart
Watermarking of Data Using Biometrics
Cryptography is the practice and study of techniques for secure communication in the presence of third parties or adversaries. So it is nothing but the art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Thus it is in general an idea of constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, and authentication. A person who possesses the secret key, which can be even his biometric information, can decrypt/decipher the message to readable/understandable format. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable or rather claim to be so till some hacker breaks into it. Cryptography systems can be broadly classified into symmetric-key systems that use a single key that both the sender and recipient have, and public-key systems that use two keys, a public key known to everyone and a private key that only the recipient of messages uses. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Access to Biomedical Images
Cryptography refers to key-controlled transformations of information that is either impossible or computationally infeasible to decipher.
Full Text Chapter Download: US $37.50 Add to Cart
Power Pell Sequences, Some Periodic Relations of These Sequences, and a Cryptographic Application With Power Pell Sequences
It is a process of protecting information and communications such that the only one for whom the information is intended can understand.
Full Text Chapter Download: US $37.50 Add to Cart
Application of Blockchain in Libraries and Information Centers
A method of protecting records or information through the use of hashes or codes, so that only authorised persons can read and process it.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Chaotic Image Encryption Based on Multi-Point Row-Column-Crossover Operation
Secret writing of information. It is a method of converting an intelligible message into an unintelligible message.
Full Text Chapter Download: US $37.50 Add to Cart
Introduction to Quantum-Resistant Blockchain
Is the method of securing information and communication based on mathematical principles. It is a technique for protecting crucial data from unauthorized access.
Full Text Chapter Download: US $37.50 Add to Cart
Quantum Blockchain for Smart Society: Applications, Challenges, and Opportunities
Is the technique of securing information and communications through use of codes so that only those persons for whom the information is intended can understand it and process it, thus preventing unauthorized access to information.
Full Text Chapter Download: US $37.50 Add to Cart
Preliminary Insights Into the Adoption of Bitcoin in a Developing Economy: The Case of Ghana
A strategy for encoding data in a specific way with the goal that those for whom it is planned can peruse and process it.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Risk and Uncertainty in Automated Applications
The practice of deliberately making a message gibberish on surface which can then be understood using a key to receive the original message, to avoid other people from reading the message.
Full Text Chapter Download: US $37.50 Add to Cart
Impact of the Coronavirus Pandemic on the Retail Industry and Its IoT Applications' Security Vulnerabilities
Blockchain’s transactions achieve validity, trust, and finality based on cryptographic proofs and underlying mathematical computations between various trading partners.
Full Text Chapter Download: US $37.50 Add to Cart
Quantum Blockchain: A Systematic Review
Is the technique of securing information and communications through use of codes so that only those people for whom the information is intended can understand it and process it. Thus, preventing unauthorized access to information.
Full Text Chapter Download: US $37.50 Add to Cart
The Emergence of Cryptography in Blockchain Technology
The practice of securing and protecting information using mathematical techniques to ensure secrecy, integrity, and validity.
Full Text Chapter Download: US $37.50 Add to Cart
Integrity Protection of Mobile Agent Data
Cryptography is the art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text.
Full Text Chapter Download: US $37.50 Add to Cart
Lightweight Cryptography for Cyber-Physical Systems: State of the Art
Is the practice and study of techniques for secure communication in the presence of third parties. It includes techniques for confidentiality, integrity, authentication, and non-repudiation.
Full Text Chapter Download: US $37.50 Add to Cart
Revolutionizing Health Data Management With Blockchain Technology: Enhancing Security and Efficiency in a Digital Era
Cryptography involves creating and analyzing protocols to secure communication in the presence of third parties, known as adversaries. It ensures the confidentiality, integrity, and authenticity of information.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain in Smart Healthcare Systems: Hope or Despair?
It is a process of hiding data using some encryption techniques.
Full Text Chapter Download: US $37.50 Add to Cart
Security-Based Knowledge Management
A technique that encrypts and decrypts a message for ensuring security and privacy during the exchange and communication process.
Full Text Chapter Download: US $37.50 Add to Cart
CSAP: Cyber Security Asynchronous Programming With C++20 and C# 8 for Internet of Things and Embedded Software Systems
Represents the art of studying techniques in order to obtain a secure communication knowing that third-parties are participating in order to obtain the real nature of secure communication.
Full Text Chapter Download: US $37.50 Add to Cart
Comprehensive Overview of Autonomous Vehicles and Their Security Against DDoS Attacks
It provides a secure communications technique that allow only the sender and intended recipient of a message to view its contents.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Technology for the Internet of Things Applications in Apparel Supply Chain Management
Cryptography is the science of keeping communications private. It is the study of methods of sending messages in disguised form so that only the intended recipients can remove the disguise and read the message. Blockchain’s transactions achieve validity, trust, and finality based on cryptographic proofs and underlying mathematical computations between various trading partners.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Swarm Robotics
Cryptography is the art (and science) of designing cryptosystems to transform messages in such a way that two entities may communicate securely over an insecure channel.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain With the Internet of Things for Secure Healthcare Service Using Lightweight Cryptography
The art and science of keeping messages secure. Cryptography is different from steganography which is used to conceal a message by hiding it in such a way that the mere existence is obscured.
Full Text Chapter Download: US $37.50 Add to Cart
Cryptocurrencies and Blockchain: Impact on Accounting and Financial Auditing
Security practice that involves the use of mathematical algorithms to protect sensitive information during data transmission or storage.
Full Text Chapter Download: US $37.50 Add to Cart
Analysis and Comparison of Hash Functions in Terms of Security and Performance
It is the study and practice of techniques for secure communication in the presence of adversarial behaviour.
Full Text Chapter Download: US $37.50 Add to Cart
System-on-Chip Design of the Whirlpool Hash Function
In modern times, cryptography has become a branch of information theory, as the mathematical study of information and especially its transmission from place to place. Cryptography is central to the techniques used in computer and network security for such things as access control and information confidentiality.
Full Text Chapter Download: US $37.50 Add to Cart
A 3D-Cellular Automata-Based Publicly-Verifiable Threshold Secret Sharing
The study of securing information such that they are safe from the hands of third parties.
Full Text Chapter Download: US $37.50 Add to Cart
DWT-Based Steganography for Image Transmission
It provides a way of securing a reliable connection.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Primer: Introduction to Blockchain Foundations and Implementation
The practice of developing techniques and protocols preventing third parties from accessing private data.
Full Text Chapter Download: US $37.50 Add to Cart
Impact of Information and Communication Technology in the Indian Education System During COVID-19
It is a technique that is used to secure communication in the presence of an adversary.
Full Text Chapter Download: US $37.50 Add to Cart
Managing Supply Chain Digitalization With Blockchain Technology
Blockchain’s transactions achieve validity, trust, and finality based on cryptographic proofs and underlying mathematical computations between various trading partners.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Technology With the Internet of Things in Manufacturing Data Processing Architecture
Blockchain’s transactions achieve validity, trust, and finality based on cryptographic proofs and underlying mathematical computations between various trading partners.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Agent Authentication and Authorization in E-Commerce
The act of protecting data by encoding them, so that they can only be decoded by individuals who possess the key.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity and Electronic Services Oriented to E-Government in Europe
The application of mathematical processes on data-at-rest and data-in-transit to provide the security benefits of confidentiality, authentication, integrity and non-repudiation. Cryptography includes three primary components: symmetric encryption, asymmetric encryption and hashing. Symmetric encryption is used to provide confidentiality. Asymmetric encryption is used to provide secure symmetric key generation, secure symmetric key exchange (via digital envelopes created through the use of the recipient's public key) verification of source, verification/control of recipient, digital signature (a combination of hashing and use of the sender's private key) and digital certificates (which provides third-party authentication services). Hashing is the cryptographic operation that produces a representational value from an input data set. A before and after hash can be compared in order to detect protection of or violation of integrity.
Full Text Chapter Download: US $37.50 Add to Cart
Application of Odd-Even Congruence Graph Labeling in Secured Cyber Physical Systems
Cryptography is a method of protecting information and communications in computer systems through the use of codes.
Full Text Chapter Download: US $37.50 Add to Cart
Challenges in FPGA Technology Paradigm for the Implementation of IoT Applications
It is used to protect the information. Cryptography is the study of secret writing or art of solving codes.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues of Cloud Computing and an Encryption Approach
Scientific discipline dedicated to fundamental techniques for information security.
Full Text Chapter Download: US $37.50 Add to Cart
Assessing Security with Regard to Cloud Applications in STEM Education
The encryption component of cryptology and has been traditionally used to defend systems using encryption and public key infrastructure (PKI).
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Storage With Sharing of Internet of Things Data in Textile Production Supply Chains
Blockchain’s transactions achieve validity, trust, and finality based on cryptographic proofs and underlying mathematical computations between various trading partners.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Readiness: Expert Perspectives From a Developing Economy
A strategy for encoding data in a specific way with the goal that those for whom it is planned can peruse and process it.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Right to Correct Information in the Cyber World
The activity and analysis mechanisms for secure communication in the face of hostile conduct is known as cryptography or cryptology.
Full Text Chapter Download: US $37.50 Add to Cart
Suggesting New Techniques and Methods for Big Data Analysis: Privacy-Preserving Data Analysis Techniques
Cryptography protects information by transforming it into a secure format known as encryption. This process ensures that only authorized people can read and process the information. It is used to secure communication from outsiders, often called adversaries.
Full Text Chapter Download: US $37.50 Add to Cart
Advancing Towards Sustainable Supply Chain Management Using IoT and Blockchain Technology
Blockchain’s transactions achieve validity, trust, and finality based on cryptographic proofs and underlying mathematical computations between various trading partners.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Technology: Applications in the Industry
This is the science of securing communication using individualized codes (e.g. public and private keys) so only the participating parties can read the encrypted messages.
Full Text Chapter Download: US $37.50 Add to Cart
Agents and Payment Systems in E-Commerce
The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain and IoT Integration in Dairy Production to Survive the COVID-19 Situation in Sri Lanka
The practice and study of secure communication techniques in the presence of third parties known as adversaries.
Full Text Chapter Download: US $37.50 Add to Cart
Supply Chain Information System for Sustainability and Interoperability of Business Service
Blockchain’s transactions achieve validity, trust, and finality based on cryptographic proofs and underlying mathematical computations between various trading partners.
Full Text Chapter Download: US $37.50 Add to Cart
The Fifth and the Sixth Order Gopala Hemachandra Representations and the Use of These Representations in Symmetric Cryptography
It is a process of protecting information and communications such that the only one for whom the information is intended can understand.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Digital Images: From Information Hiding Perspective
The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text.
Full Text Chapter Download: US $37.50 Add to Cart
Cryptography for Information Security
The “Study of mathematical techniques” and its goals are: Confidentiality, Data Integrity, Authentication and Nonrepudiation.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Watermarking and Steganography
A study of making a message secure through encryption; secret key and public key are the two major camps of cryptographic algorithms. In secret key cryptography, one key is used for both encryption and decryption, while in public key cryptography, two keys (public and private) are used.
Full Text Chapter Download: US $37.50 Add to Cart
An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves
The art and science of creating unreadable messages from readable messages by the need of security.
Full Text Chapter Download: US $37.50 Add to Cart
A Survey of Information Hiding
In cryptography, the information is encrypted with a key and only the person who has the key can decrypt and read the information. So without the key, nobody has access to that information.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain-Enabled Internet of Things Application in Supply Chain Operations Sustainability Management
Blockchain’s transactions achieve validity, trust, and finality based on cryptographic proofs and underlying mathematical computations between various trading partners.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Technology: Initiatives and Use Cases in the Industry
This is the science of securing communication using individualized codes (e.g. public and private keys) so only the participating parties can read the encrypted messages.
Full Text Chapter Download: US $37.50 Add to Cart
Medical Data Security Tools and Techniques in E-Health Applications
The transformation of secret data into codes for transmission over a communication network to restrain unauthorized access.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem: New ElGamal Cryptosystems With Some Special Sequences and Composite ElGamal Cryptosystem
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR