Recent Trends in Cryptography - 2025.pdf

ijcisjournal 16 views 8 slides Sep 02, 2025
Slide 1
Slide 1 of 8
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8

About This Presentation

International Journal on Cryptography and Information Security (IJCIS) is an open access peer
reviewed journal that focuses on cutting-edge results in applied cryptography and Information
security. It aims to bring together scientists, researchers and students to exchange novel ideas and
results in ...


Slide Content

Recent Trends in
Cryptography and
Information
Security - 2025

International Journal on Cryptography and Information Security
(IJCIS)

ISSN : 1839 – 8626

https://wireilla.com/ijcis/index.html
h-index 15

MODELING DIFFIE HELLMAN KEY EXCHANGE ALGORITHM USING OBJECT-ORIENTED
ANALYSIS AND DESIGN TECHNIQUE

Ashioba, Nwanze Chukwudi
1
, Emma-Osiebe Obaro
2
, Ogbodhu, Charles UzomaOdoji-Kpasa
3
,
Ndubuife Nonso Daniel
4


1Dennis Osadebay University AnwaiAsaba, Delta State, Nigeria
2Delta State polytechnic Ogwashi-uku, Delta State, Nigeria
3Michael & Cecilia Ibru University, Delta State, Nigeria
4National Open University of Nigeria.
ABSTRACT

In a communicating system, information transmitted from one location (sender) to another (receiver) is
secured or protected from unauthorized users or intruders. Many cryptographic algorithms have been used
to prevent and protect data and information from being hacked by intruders. Both symmetric and
asymmetric algorithms have not been successful in simulating cryptosystems as real-world issues with
things enclosed in properties and procedures. This research simulates the Diffie Hellman key exchange
algorithm using object-oriented analysis and design techniques. The researchers used the Unified
Modeling Language tools in the analysis and design of the system and implemented the Diffie Hellman
key exchange algorithm using C++ object-oriented programming language. The outcome demonstrates
that cryptosystems are actual issues with entities having encapsulated properties and functions.

KEYWORDS
Asymmetric cryptography, Cryptography, public key, private key and symmetric cryptography.
For More Details : https://wireilla.com/papers/ijcis/V14N2/14224ijcis01.pdf
Volume Link : https://airccse.org/journal/ijcis/current2024.html

REFERENCES

[1] Ashioba, N. C and Yoro, R. “RSA Cryptosystem using Object-Oriented Modeling
Technique,” International Journal of Information and Communication Technology
Research, vol. 4, no. 2, pp. 57-61, 2014.

[2] DharitriTalukdar, Prof (Dr.) Lakshmi P. Saikia. A Review On Different Encryption
Techniques: A Comparative Study. International Journal of Engineering Research and
General Science Volume 3, Issue 3, May-June, 2015 ISSN 2091-2730

[3] Forouzan B. A. “Data Communication and Networking (4 Edition)”, McGraw Hill Inc.
New York, 2008.

[4] Kaushik A. and Satvika, “Extended Diffie-Hellman Algorithm for key Exchange and
Management” International Journal of Advances in Engineering Sciences. Vol. 3(3) pp.
67-70, July 2013.

[5] SharadBoni, JaimikBhayy, and Santosh Bhat. Improving the Diffie-Hellman key exchange
Algorithm by proposing the multiplicative key exchange Algorithm. International Journal
of Computer Application Vol. 130, No. 15, 2015.

[6] Chavan, A., Jadhav, A., Kumbhar, S. and Joshi, I. Data Transmission using RSA
Algorithm. International Research Journal of Engineering and Technology (IRJET) Vol. 6
Issue 3, Mar. 2019.

[7] Abari, O. J., Shola, P. B. and Philip S.Comparative Analysis of Discrete Logarithm and
RSA Algorithm in Data Cryptography. International Journal of Computer Science and
Information Security, Vol. 13, No. 2 2015.

[8] Navpreet K., and Nagpal R. Authenticated Diffie-Hellman Key Exchange Algorithm.
International Journal of Computer Science and Information Technologies Vol. 5 Issue 4.,
2014

[9] Subrahmanyeswara Rao S. V. B, and Yalamanchili. Anjani. An Approach to Public-Key
Cryptography using Diffie - Hellman Key Exchange Algorithm. International Journal for
Research in Engineering Application & Management (IJREAM) ISSN: 2454-9150 Vol-
03, Issue-08, Nov 2017

[10] Emmanuel Bresson, Olivier Chevassut,David Pointcheva, and Jeanuser A wish to set u a
connection with user B and use a Jacques Quisquater, "Authenticated Group Diffie-
Hellman Key Exchange", International Journal on Cryptography and Information Security
(IJCIS), Vol. 14, No.2, June 2024 8 Computer and Communication Security- proc of ACM
CSS'OI, Philadelphia, Pennsylvania, USA, Pages 255-264, ACM Press, November 5-8,
2001.

[11] Eun-Jun Yoon and Kee-Young Yoo, "An Efficient Diffie- HellmanMAC Key Exchange
Scheme", 2009 Fourth International Conference on Innovative Computing, Information,
and Control.

[12] Vinothini, Sarany, Vasumathl A Study on Diffie-Hellman Algorithm in Network Security.
International Journal of Engineering and Computer Science ISSN:2319-7242 volume 3
Issue 7 July 2014 Page No. 7346-7349

[13] MonalisaJha and Shraddha Patil (2015). Advancement in Diffie-Hellman Algorithm.
ManolisaJha’ Int Journal of Engineering Research and Applications. ISSN -2248-9622.
Vol 5, Issue 7 July 2015, pp1-2.

[14] Aldo Adrian, Maya Cendana, SilvereDiah Handy Permana. Diffie-Hellman Key
Exchange Modification using Blowfish Algorithm to prevent logjam attack. Journal of
Telecommunication, Electronic and Computer Engineering ISSN 2180-1843. Vol 10, No
4; 2018.

[15] Dhiman, K. S., Shatma, A., and Kaur A. “Comprehensive Study of Object Oriented
Anaylsis and Design by using the Concept of OOSE”International Journal of Research in
Education Methodology Vol. 1, No. 1. pp. 14-16, 2012.

[16] Nayak R., Patheja P. S., and Waoo A. A. “Design of Weather Forecasting System through
unified modeling language”. International Journal of Research in Engineering and Applied
Sciences Vol. 2 (2) pp. 1189-1194, 2012.

A UNIVERSAL WHITENING ALGORITHM FOR COMME RCIAL RANDOM NUMBER
GENERATORS

Avval Amil
1
, ∗ and Shashank Gupta
2
,

1Department of Computer Science and Engineering, I.I.T. Delhi, Hauz Khas, New Delhi - 110016, India 2QuNu Labs Pvt. Ltd., M.
G. Road, Bengaluru, Karnataka 560025, India

ABSTRACT

In this work, we present a universal whitening algorithm using n-qubit permutation matrices to remove
the imperfections in commercial random number generators without compression. Specifically, we
demonstrate the efficacy of our algorithm in several categories of random number generators and its
comparison with cryptographic hash functions and block ciphers.

KEYWORDS
Quantum Cryptography, Quantum random number generator, entropy
For More Details : https://wireilla.com/papers/ijcis/V14N1/14124ijcis01.pdf

Volume Link : https://airccse.org/journal/ijcis/current2024.html

REFERENCES

[1] Cusick, Thomas W. and Pantelimon Stanica, Cryptograhic Boolean Functions and Applications,
Academic Press, 2009, pp. 19; Thamrin, N.M., G. Witjaksono. et. al., An Enhanced Hardware-
based Hybrid Random Number Generator For Cryptosystem, ICIME ’09 Proceedings of the
International Conference on Information Management and Engineering, April 03 – April 05
2009, pp. 152-156; Sam Mitchum, Digital Implementation of a True Random Number
Generator, Dissertation, Virginia Commonwealth University.

[2] Manabendra Nath Bera, Antonio Acín, Marek Kuś, Morgan W Mitchell and Maciej Lewenstein,
Randomness in quantum mechanics: philosophy, physics and technology, Rep. Prog. Phys. 80
124001 (2017); Vaisakh Mannalath, Sandeep Mishra, Anirban Pathak, A Comprehensive
Review of Quantum Random Number Generators: Concepts, Classification and the Origin of
Randomness, arXiv: 2203.00261 (2022).

[3] ID Quantique, IDQ Random Number Generation, (2017); QNu Labs, Tropos - Quantum
Random Number Generator (2020); Quintessence Labs, qStream quantum random number
generator (2020). V. Lovic, D.G. Marangon, M. Lucamarini, Z. Yuan, and A.J. Shields,
Characterizing Phase Noise in a Gain-Switched Laser Diode for Quantum Random-Number
Generation, Phys. Rev. Applied 16, 054012 (2021).

[4] Toni Stojanovski and Ljupco Kocarev, Chaos-Based Random Number Generators—Part I:
Analysis, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: FUNDAMENTAL
THEORY AND APPLICATIONS, VOL. 48, NO. 3, MARCH (2001); Toni Stojanovski, Johnny
Pihl, and Ljupco Kocarev, Chaos-Based Random Number Generators—Part II: Practical
Realization, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: FUNDAMENTAL
THEORY AND APPLICATIONS, VOL. 48, NO. 3, MARCH (2001).

[5] F.James, A review of pseudorandom number generators, Computer Physics Communications
Volume 60, Issue 3, Pages 329-344 (1990)

[6] Darren Hurley-Smith and Julio Hernandez-Castro, Quam Bene Non Quantum: Bias in a Family
of Quantum Random Number Generators, Cryptology ePrint Archive, Paper 2017/842 (2017)

[7] Amalia Beatriz Orúe, Luis Hernández Encinas, Veronica Fernández and Fausto Montoya, A
Review of Cryptographically Secure PRNGs in Constrained Devices for the IoT, Part of the
Advances in Intelligent Systems and Computing book series (AISC,volume 649) (2017); Luca
Baldanzi, Luca Crocetti, Francesco Falaschi, Matteo Bertolucci, Jacopo Belli, Luca Fanucci and
Sergio Saponara, Cryptographically Secure Pseudo-Random Number Generator IP-Core Based
on SHA2 Algorithm, Sensors 2020, 20(7), 1869 (2020). Frederick James and Lorenzo Moneta,
Review of High-Quality Random Number Generators , Computing and Software for Big Science
volume 4, Article number: 2 (2020); George Marsaglia, Xorshift RNGs, Journal of Statistical
Software, 8(14), 1–6 (2003); Sebastiano Vigna, Further scramblings of Marsaglia’s xorshift
generators, arXiv:1404.0390 (2014) International Journal on Cryptography and Information
Security (IJCIS), Vol. 14, No.1, March 2024 18

[8] You-Qi Nie, Leilei Huang, Yang Liu, Frank Payne, Jun Zhang, and Jian-Wei Pan, The
generation of 68 Gbps quantum random number by measuring laser phase fluctuations, Review
of Scientific Instruments 86, 063105 (2015); Xiongfeng Ma, Xiao Yuan, Zhu Cao, Bing Qi and
Zhen Zhang, Quantum random number generation, npj Quantum Information volume 2, Article
number: 16021 (2016); Tobias Gehring, Cosmo Lupo, Arne Kordts, Dino Solar Nikolic, Nitin
Jain, Tobias Rydberg, Thomas B. Pedersen, Stefano Pirandola and Ulrik L. Andersen,

Homodyne-based quantum random number generator at 2.9 Gbps secure against quantum side-
information, Nature Communications volume 12, Article number: 605 (2021).

[9] M. Hayashi and T. Tsurumaru, More Efficient Privacy Amplification With Less Random Seeds
via Dual Universal Hash Function, IEEE Transactions on Information Theory, vol. 62, no. 4, pp.
2213-2232, (2016); D. Li, P. Huang, Y. Zhou, Y. Li and G. Zeng, Memory-Saving
Implementation of High-Speed Privacy Amplification Algorithm for Continuous-Variable
Quantum Key Distribution, IEEE Photonics Journal, vol. 10, no. 5, pp. 1-12, Art no. 7600712
(2018); Tang, BY., Liu, B., Zhai, YP. et al., High-speed and Large-scale Privacy Amplification
Scheme for Quantum Key Distribution, Sci Rep 9, 15733 (2019).

[10] Randy Kuang and Nicolas Bettenburg, Shannon Perfect Secrecy in a Discrete Hilbert
Space, IEEE International Conference on Quantum Computing and Engineering, QCE 2020,
Denver, CO, USA, October 12-16, pp. 249-255, (2020); Randy Kuang and Michel Barbeau,
Quantum permutation pad for universal quantum-safe cryptography, Quantum Information
Processing volume 21, Article number: 211 (2022); Randy Kuang, Dafu Lou, Alex He,
Alexandre Conlon, Quantum Secure Lightweight Cryptography with Quantum Permutation Pad,
Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page
No 401-405, (2021); R. Kuang, D. Lou, A. He, C. McKenzie and M. Redding, Pseudo Quantum
Random Number Generator with Quantum Permutation Pad, IEEE International Conference on
Quantum Computing and Engineering (QCE), pp. 359-364 (2021); Shende, V.V., Synthesis of
reversible logic circuits, IEEE Transactions on Computer-Aided Design of Integrated Circuits
and Systems.

[11] John Walker, Ent. A pseudo-random number sequence testing program, ENT, (2022)

[12] National Institute of Standards and Technology, NIST computer security resource center
(CSRC), NIST, (2022) International Journal on Cryptography and Information Security (IJCIS),
Vol. 14, No.1, March 2024 19


[13] J K M Sadique Uz Zaman, A Review Study of NIST Statistical Test Suite: Development
of an indigenous Computer Package, arXiv:1208.5740 (2012)

[14] Avval Amil, Shashank Gupta, Quantum entropy expansion using n-qubit permutation
matrices in Galois field, arXiv:2207.07‘48 (2022)

[15] ID Quantique, QRNG resource library; Crypta Labs QRNG data, https://cryptalabs.com/


[16] Avval Amil is an undergraduate at IIT Delhi in New Delhi, 110016, India. His research
interests include quantum computation and theoretical aspects of computer science and physics.
Amil is currently pursuing his B.Tech in CSE from IIT Delhi. Contact him at
[email protected].

[17] Shashank Gupta is a Senior Research Associate at QuNu Labs Pvt. Ltd. in Bangalore,

560025, India. His research interests include quantum cryptography, quantum information theory,
and quantum communication. He was a part of the Integrated Ph.D. program in Physical Sciences
at S. N. Bose National Centre for Basic Sciences, Kolkata, 700106, India. Contact him at
[email protected]