A Review on Cryptography Protocol for Securing Data

Cryptography is one type of protection that is widely used to secure information, encryption and decryption and the use of keys is a common process used to secure information; and also the cryptographic processes have a classic problem that is the distribution of keys that are vulnerable to interception when the key is sent by the sender to the receiver, the cryptographic protocol (Authentication) could be used to minimize key distribution problem because there is no need for key exchanges. Shamir's Three-Pass Protocol, Secret Splitting, Bit-Commitment Protocol and Blind Signature are few cryptographic protocols that can be used to help with key distribution issues, this article performs systematic approach to protocol cryptography for security level and the using other algorithms to combine with protocol.

[1]  S. Nithya,et al.  Genetic algorithm based bacterial foraging optimization with three-pass protocol concept for heterogeneous network security enhancement , 2017, J. Comput. Sci..

[2]  Sherman S. M. Chow Blind signature and ring signature schemes: Rehabilitation and attack , 2009, Comput. Stand. Interfaces.

[3]  Robbi Rahim 128 Bit Hash of Variable Length in Short Message Service Security , 2017 .

[4]  R. Werner,et al.  A short impossibility proof of quantum bit commitment , 2009, 0905.3801.

[5]  T. Aaron Gulliver,et al.  A practical quantum bit commitment protocol , 2011, 1111.6311.

[6]  Oyas Wahyunggoro,et al.  3D OBJECT MODELING USING DATA FUSION FROM LASER SENSOR ON QUADROTOR , 2016 .

[7]  Iskandar Zulkarnain,et al.  Prime Number: an Experiment Rabin-Miller and Fast Exponentiation , 2017 .

[9]  H. F. Chau,et al.  Why quantum bit commitment and ideal quantum coin tossing are impossible , 1997 .

[10]  Li Xiaohui,et al.  Fair e-payment protocol based on blind signature , 2009 .

[11]  Robbi Rahim,et al.  Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher , 2016 .

[12]  Altair Olivo Santin,et al.  A Three-Pass Protocol for Cryptography Based on Padding for Wireless Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[13]  Jiang Hua,et al.  Online/Offline Blind Signature , 2012 .

[14]  Dongdai Lin,et al.  A randomized RSA-based partially blind signature scheme for electronic cash , 2005, Comput. Secur..

[15]  Robbi Rahim,et al.  Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm , 2016 .

[16]  Heri Nurdiyanto,et al.  Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement , 2017 .

[17]  Hung-Min Sun,et al.  On the Security of Some Proxy Blind Signature Schemes , 2005, ACSW.

[18]  Junli Liang,et al.  A secure double-image sharing scheme based on Shamir׳s three-pass protocol and 2D Sine Logistic modulation map in discrete multiple-parameter fractional angular transform domain , 2016 .