Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 7, Issue 1

2023 March - 15 articles

Cover Story: Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to explore the problems that password authentication and password policies present and aims to deploy Windows Hello for Business (WHFB) on-premises. It was concluded that many organizations still use password authentication as their primary authentication method for accessing devices and applications. Larger organizations such as Microsoft and Google support the adoption of password-less authentication for end-users, and the current usage of password-less authentication shared by both organizations is encouraged. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (15)

  • Article
  • Open Access
6 Citations
5,317 Views
13 Pages

Cybersecurity Test Bed for Smart Contracts

  • Casimer DeCusatis,
  • Brian Gormanly,
  • John Iacino,
  • Reed Percelay,
  • Alex Pingue and
  • Justin Valdez

Blockchain, smart contracts, and related concepts have emerged in recent years as a promising technology for cryptocurrency, NFTs, and other areas. However, there are still many security issues that must be addressed as these technologies evolve. Thi...

  • Article
  • Open Access
4 Citations
4,006 Views
27 Pages

Models for Generation of Proof Forest in zk-SNARK Based Sidechains

  • Yuri Bespalov,
  • Lyudmila Kovalchuk,
  • Hanna Nelasa,
  • Roman Oliynykov and
  • Rob Viglione

Sidechains are among the most promising scalability and extended functionality solutions for blockchains. Application of zero knowledge techniques (Latus, Mina) allows for reaching high level security and general throughput, though it brings new chal...

  • Article
  • Open Access
7 Citations
5,707 Views
15 Pages

A Decentralized COVID-19 Vaccine Tracking System Using Blockchain Technology

  • Atsuki Koyama,
  • Van Chuong Tran,
  • Manato Fujimoto,
  • Vo Nguyen Quoc Bao and
  • Thi Hong Tran

Coronavirus disease 2019 (COVID-19) vaccines play a crucial role in preventing the spread of the disease. However, the circulation of low-quality and counterfeit vaccines seriously affects human health and the reputation of real vaccine manufacturers...

  • Article
  • Open Access
12 Citations
4,285 Views
17 Pages

Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors

  • Osama A. Khashan,
  • Nour M. Khafajah,
  • Waleed Alomoush,
  • Mohammad Alshinwan,
  • Sultan Alamri,
  • Samer Atawneh and
  • Mutasem K. Alsmadi

Securing multimedia data on disk drives is a major concern because of their rapidly increasing volumes over time, as well as the prevalence of security and privacy problems. Existing cryptographic schemes have high computational costs and slow respon...

  • Article
  • Open Access
3 Citations
3,973 Views
16 Pages

With the development of the mobile internet, service providers obtain data and resources through a large number of terminal user devices. They use private data for business empowerment, which improves the user experience while causing users’ pr...

  • Article
  • Open Access
3 Citations
2,925 Views
25 Pages

Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC

  • Takashi Kurokawa,
  • Takuma Ito,
  • Naoyuki Shinohara,
  • Akihiro Yamamura and
  • Shigenori Uchiyama

Multivariate public-key cryptosystems are potential candidates for post-quantum cryptography. The security of multivariate public-key cryptosystems relies on the hardness of solving a system of multivariate quadratic polynomial equations. Faugè...

  • Article
  • Open Access
5 Citations
14,318 Views
22 Pages

Attacking Windows Hello for Business: Is It What We Were Promised?

  • Joseph Haddad,
  • Nikolaos Pitropakis,
  • Christos Chrysoulas,
  • Mouad Lemoudden and
  • William J. Buchanan

Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to...

  • Article
  • Open Access
6 Citations
3,620 Views
30 Pages

The Simeck family of lightweight block ciphers was proposed by Yang et al. in 2015, which combines the design features of the NSA-designed block ciphers Simon and Speck. Previously, we proposed the use of linear cryptanalysis using super-rounds to in...

  • Article
  • Open Access
13 Citations
4,029 Views
16 Pages

Privacy Preserved Video Summarization of Road Traffic Events for IoT Smart Cities

  • Mehwish Tahir,
  • Yuansong Qiao,
  • Nadia Kanwal,
  • Brian Lee and
  • Mamoona Naveed Asghar

The purpose of smart surveillance systems for automatic detection of road traffic accidents is to quickly respond to minimize human and financial losses in smart cities. However, along with the self-evident benefits of surveillance applications, priv...

  • Article
  • Open Access
12 Citations
6,152 Views
12 Pages

High Throughput PRESENT Cipher Hardware Architecture for the Medical IoT Applications

  • Jamunarani Damodharan,
  • Emalda Roslin Susai Michael and
  • Nasir Shaikh-Husin

The Internet of Things (IoT) is an intelligent technology applied to various fields like agriculture, healthcare, automation, and defence. Modern medical electronics is also one such field that relies on IoT. Execution time, data security, power, and...

  • Article
  • Open Access
10 Citations
3,276 Views
21 Pages

Quantum Secret Aggregation Utilizing a Network of Agents

  • Michael Ampatzis and
  • Theodore Andronikos

Suppose that the renowned spymaster Alice controls a network of spies who all happen to be deployed in different geographical locations. Let us further assume that all spies have managed to get their hands on a small, albeit incomplete by itself, sec...

  • Article
  • Open Access
2 Citations
3,556 Views
18 Pages

The chances of detecting a malicious reliability attack induced by an offshore foundry are grim. The hardware Trojans affecting a circuit’s reliability do not tend to alter the circuit layout. These Trojans often manifest as an increased delay...

  • Article
  • Open Access
4 Citations
5,101 Views
11 Pages

In modern society, the Internet is one of the most used means of communication. Thus, secure information transfer is inevitably of major importance. Computers nowadays use encryption methods based on arithmetic operations to turn messages into cipher...

  • Article
  • Open Access
1 Citations
4,143 Views
13 Pages

A two-party authenticated key exchange (AKE) protocol allows each of the two parties to share a common secret key over insecure channels, even in the presence of active adversaries who can actively control and modify the exchanged messages. To captur...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X