{"id":"https://openalex.org/W4360585197","doi":"https://doi.org/10.1109/ic3i56241.2022.10072578","title":"An Analysis of Different Cryptocraphy Techniques and the Role of Coding and Information Theories in Overcoming Security Threats","display_name":"An Analysis of Different Cryptocraphy Techniques and the Role of Coding and Information Theories in Overcoming Security Threats","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4360585197","doi":"https://doi.org/10.1109/ic3i56241.2022.10072578"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i56241.2022.10072578","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10072578","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072854763","display_name":"Mohammed K. Shakeel","orcid":"https://orcid.org/0000-0003-2019-2292"},"institutions":[{"id":"https://openalex.org/I19688894","display_name":"Invertis University","ror":"https://ror.org/04zxaa490","country_code":"IN","type":"education","lineage":["https://openalex.org/I19688894"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mohammed Shakeel","raw_affiliation_strings":["Invertis University,Faculty of Computer Applications,Bareilly, Rajau Paraspur,Uttar Pradesh","Faculty of Computer Applications, Invertis University, Bareilly, Rajau Paraspur, Uttar Pradesh"],"affiliations":[{"raw_affiliation_string":"Invertis University,Faculty of Computer Applications,Bareilly, Rajau Paraspur,Uttar Pradesh","institution_ids":["https://openalex.org/I19688894"]},{"raw_affiliation_string":"Faculty of Computer Applications, Invertis University, Bareilly, Rajau Paraspur, Uttar Pradesh","institution_ids":["https://openalex.org/I19688894"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019217875","display_name":"A. Sirisha","orcid":"https://orcid.org/0009-0005-9237-3350"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Sirisha","raw_affiliation_strings":["Vignan&#x2019;s Institute of information technology (Autonomous),Department of Information technology,Visakhapatnam,Andra Pradesh"],"affiliations":[{"raw_affiliation_string":"Vignan&#x2019;s Institute of information technology (Autonomous),Department of Information technology,Visakhapatnam,Andra Pradesh","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085427566","display_name":"Abhishek Joshi","orcid":"https://orcid.org/0000-0001-8328-0738"},"institutions":[{"id":"https://openalex.org/I3132702812","display_name":"Uttaranchal University","ror":"https://ror.org/00ba6pg24","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132702812"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ankita Joshi","raw_affiliation_strings":["Uttaranchal University,Dehradun,Uttarakhand,India","Uttaranchal University, Dehradun, Uttarakhand, India"],"affiliations":[{"raw_affiliation_string":"Uttaranchal University,Dehradun,Uttarakhand,India","institution_ids":["https://openalex.org/I3132702812"]},{"raw_affiliation_string":"Uttaranchal University, Dehradun, Uttarakhand, India","institution_ids":["https://openalex.org/I3132702812"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077535747","display_name":"R. Ushasree","orcid":null},"institutions":[{"id":"https://openalex.org/I8977528","display_name":"Dr. Hari Singh Gour University","ror":"https://ror.org/01xapxe37","country_code":"IN","type":"education","lineage":["https://openalex.org/I8977528"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R. Ushasree","raw_affiliation_strings":["Dayananda Sagar Academy of Technology &#x0026; Management, VTU,Department of MCA"],"affiliations":[{"raw_affiliation_string":"Dayananda Sagar Academy of Technology &#x0026; Management, VTU,Department of MCA","institution_ids":["https://openalex.org/I8977528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053029630","display_name":"M. Vaishnavi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210109528","display_name":"PSG INSTITUTE OF TECHNOLOGY AND APPLIED RESEARCH","ror":"https://ror.org/01sa9ng67","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210109528"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. Vaishnavi","raw_affiliation_strings":["CSE, Bannari Amman Institute of Technology,Erode,Tamil Nadu,India","CSE, Bannari Amman Institute of Technology, Erode, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"CSE, Bannari Amman Institute of Technology,Erode,Tamil Nadu,India","institution_ids":["https://openalex.org/I4210109528"]},{"raw_affiliation_string":"CSE, Bannari Amman Institute of Technology, Erode, Tamil Nadu, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003408809","display_name":"Devvret Verma","orcid":"https://orcid.org/0000-0002-0654-2009"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Devvret Verma","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Biotechnology,Dehradun,Uttarakhand,India","Department of Biotechnology, Graphic Era Deemed to be University, Dehradun, Uttarakhand, India"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Biotechnology,Dehradun,Uttarakhand,India","institution_ids":["https://openalex.org/I60054993"]},{"raw_affiliation_string":"Department of Biotechnology, Graphic Era Deemed to be University, Dehradun, Uttarakhand, India","institution_ids":["https://openalex.org/I60054993"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5072854763"],"corresponding_institution_ids":["https://openalex.org/I19688894"],"apc_list":null,"apc_paid":null,"fwci":0.3031,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66863106,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"21","issue":null,"first_page":"223","last_page":"228"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7104317545890808},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6722071170806885},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.655510425567627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5396632552146912},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.48274344205856323},{"id":"https://openalex.org/keywords/pkcs-#1","display_name":"PKCS #1","score":0.4766886234283447},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.430570513010025},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40204817056655884},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.30191612243652344}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7104317545890808},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6722071170806885},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.655510425567627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5396632552146912},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.48274344205856323},{"id":"https://openalex.org/C186497982","wikidata":"https://www.wikidata.org/wiki/Q7119499","display_name":"PKCS #1","level":4,"score":0.4766886234283447},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.430570513010025},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40204817056655884},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.30191612243652344}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i56241.2022.10072578","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10072578","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.75,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1168535608","https://openalex.org/W2063531831","https://openalex.org/W2072886108","https://openalex.org/W2292613077","https://openalex.org/W2514300547","https://openalex.org/W2765329640","https://openalex.org/W2774872969","https://openalex.org/W2884117672","https://openalex.org/W2970769336","https://openalex.org/W2982657588","https://openalex.org/W2996908335","https://openalex.org/W3026554779","https://openalex.org/W3046823304","https://openalex.org/W3153045320","https://openalex.org/W3191606084","https://openalex.org/W6681871932","https://openalex.org/W6744865763","https://openalex.org/W6753073730","https://openalex.org/W6780976607","https://openalex.org/W6799598741"],"related_works":["https://openalex.org/W2887779253","https://openalex.org/W2533462565","https://openalex.org/W4377234699","https://openalex.org/W2369864987","https://openalex.org/W3007745699","https://openalex.org/W2912829606","https://openalex.org/W104347322","https://openalex.org/W2744204007","https://openalex.org/W2359712622","https://openalex.org/W767161385"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,19,42,58,72,119,141,145,154,181],"maintain":[3],"the":[4,60,74,110,114,123,127,135,146,149,155,183],"privacy":[5],"and":[6,46,52,63,71,81,102,157,186],"secrecy":[7],"of":[8,67,76,90,117,176,188],"information,":[9],"security":[10,30,187],"is":[11,24,57,139,152],"essential.":[12],"There":[13],"are":[14],"numerous":[15],"encryption":[16,34,37],"techniques":[17],"available":[18],"safeguard":[20],"data":[21],"while":[22],"it":[23],"being":[25,69],"transmitted":[26],"or":[27],"stored.":[28],"Communication":[29],"benefits":[31],"greatly":[32],"from":[33],"algorithms.":[35,159],"These":[36],"strategies":[38],"vary":[39],"with":[40],"regards":[41],"their":[43],"solidarity,":[44],"snappiness,":[45],"asset":[47],"needs":[48],"(CPU":[49],"use,":[50],"memory,":[51],"power).":[53],"This":[54,84,160],"study\u2019s":[55],"goal":[56],"list":[59],"most":[61],"famous":[62],"fascinating":[64],"calculations":[65,173],"as":[66],"now":[68],"used":[70],"present":[73],"ideas":[75],"cryptography,":[77],"cryptography":[78,92],"in":[79,174],"history,":[80],"modern":[82],"cryptography.":[83],"investigation":[85],"focused":[86],"on":[87],"a":[88,165],"number":[89],"existing":[91],"calculations,":[93],"including":[94],"DES,":[95],"IDEA,":[96],"3DES,":[97],"AES,":[98],"ECC,":[99],"RSA,":[100],"homomorphic":[101],"blowfish,":[103],"among":[104],"others.":[105],"It":[106],"was":[107],"determined":[108],"that":[109,134],"RSA":[111,158],"algorithm":[112,137,151],"takes":[113],"longest":[115],"amount":[116],"time":[118],"encrypt":[120],"data,":[121],"whereas":[122],"AES":[124,136,150],"approach":[125],"uses":[126],"fewest":[128],"text":[129],"files.":[130],"We":[131],"also":[132],"demonstrated":[133],"decryption":[138],"superior":[140,153],"other":[142],"methods.":[143],"According":[144],"analytical":[147],"findings,":[148],"DES":[156],"study":[161],"recommended":[162],"further":[163],"developing":[164],"consolidate":[166],"encipherment":[167,172,189],"calculation,":[168],"which":[169],"joins":[170],"different":[171],"light":[175],"every":[177],"single":[178],"relevant":[179],"trademark,":[180],"expand":[182],"general":[184],"wellbeing":[185],"strategies.":[190]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
