Matches in SemOpenAlex for { <https://semopenalex.org/work/W2188045600> ?p ?o ?g. }
Showing items 1 to 67 of
67
with 100 items per page.
- W2188045600 abstract "Cryptography is taught with the basic rule that there is no such thing as an unbreakable encryption because If someone tries enough keys he is bound to get the right one, which gives rise to the basis of the brute force attack. Brute force attack, or exhaustive key search, is a strategy that can, in theory, be used against any encrypted data. It involves systematically checking all possible keys until the correct key is found. One of the measures of the strength of an encryption system is how long it would theoretically take an attacker to mount a successful brute-force attack against it. The so-called Landauer limit implied by the laws of physics sets a lower limit on the energy required to perform a computation of kT and the processing speed and memory requirements also set physical barriers. But with the exponential growth of computing industry supercomputers having computing capacities of 20 Peta-FLOPS and beyond have been made and a number of systems that were originally thought to be impossible to crack by brute force have nevertheless been cracked. A truly unbreakable code must not have an obtainable key. A theory for this is for the code breaker to not realize that he has broken the code even if he has the key. For example, the key and cleartext may change according to a random time variable so that even when the code has been broken the encrypted text could still represent any other meaning. This is however very impractical and has never been able to be put into effect. This paper discusses unbreakability of encryptions and proposes an encryption that can be called truly unbreakable. This paper also discusses a way of implementing an encryption that is contextually breakable and hence can only be used by random common users not criminals and terrorists because for them the code can be broken. Modern world is moving towards cyber globe. In an era where meetings, conversations, decision making, information sharing and even social aspects of life are moving online and offline on digital and cyber world, it is necessary to provide for security and privacy on cyber and digital world which is provided cryptography. The world of cryptography has come from historic roots where cryptography was a physical world phenomenon with no particular definition except communication with codes. In the modern era the cryptographic scenario has" @default.
- W2188045600 created "2016-06-24" @default.
- W2188045600 creator A5049252241 @default.
- W2188045600 date "2014-01-01" @default.
- W2188045600 modified "2023-09-26" @default.
- W2188045600 title "Unbreakability of Encryption & DLT Standard" @default.
- W2188045600 cites W1892798954 @default.
- W2188045600 cites W2101145787 @default.
- W2188045600 hasPublicationYear "2014" @default.
- W2188045600 type Work @default.
- W2188045600 sameAs 2188045600 @default.
- W2188045600 citedByCount "0" @default.
- W2188045600 crossrefType "journal-article" @default.
- W2188045600 hasAuthorship W2188045600A5049252241 @default.
- W2188045600 hasConcept C122760801 @default.
- W2188045600 hasConcept C148730421 @default.
- W2188045600 hasConcept C177264268 @default.
- W2188045600 hasConcept C178489894 @default.
- W2188045600 hasConcept C199360897 @default.
- W2188045600 hasConcept C203062551 @default.
- W2188045600 hasConcept C207468940 @default.
- W2188045600 hasConcept C26517878 @default.
- W2188045600 hasConcept C2776760102 @default.
- W2188045600 hasConcept C38652104 @default.
- W2188045600 hasConcept C41008148 @default.
- W2188045600 hasConcept C7646194 @default.
- W2188045600 hasConcept C80444323 @default.
- W2188045600 hasConceptScore W2188045600C122760801 @default.
- W2188045600 hasConceptScore W2188045600C148730421 @default.
- W2188045600 hasConceptScore W2188045600C177264268 @default.
- W2188045600 hasConceptScore W2188045600C178489894 @default.
- W2188045600 hasConceptScore W2188045600C199360897 @default.
- W2188045600 hasConceptScore W2188045600C203062551 @default.
- W2188045600 hasConceptScore W2188045600C207468940 @default.
- W2188045600 hasConceptScore W2188045600C26517878 @default.
- W2188045600 hasConceptScore W2188045600C2776760102 @default.
- W2188045600 hasConceptScore W2188045600C38652104 @default.
- W2188045600 hasConceptScore W2188045600C41008148 @default.
- W2188045600 hasConceptScore W2188045600C7646194 @default.
- W2188045600 hasConceptScore W2188045600C80444323 @default.
- W2188045600 hasLocation W21880456001 @default.
- W2188045600 hasOpenAccess W2188045600 @default.
- W2188045600 hasPrimaryLocation W21880456001 @default.
- W2188045600 hasRelatedWork W1424730906 @default.
- W2188045600 hasRelatedWork W1874167190 @default.
- W2188045600 hasRelatedWork W2162367845 @default.
- W2188045600 hasRelatedWork W2185386872 @default.
- W2188045600 hasRelatedWork W2340305575 @default.
- W2188045600 hasRelatedWork W2466999831 @default.
- W2188045600 hasRelatedWork W2486091148 @default.
- W2188045600 hasRelatedWork W2552989614 @default.
- W2188045600 hasRelatedWork W2890420371 @default.
- W2188045600 hasRelatedWork W2900898369 @default.
- W2188045600 hasRelatedWork W2914682754 @default.
- W2188045600 hasRelatedWork W2935473647 @default.
- W2188045600 hasRelatedWork W3094460363 @default.
- W2188045600 hasRelatedWork W3176953690 @default.
- W2188045600 hasRelatedWork W33948074 @default.
- W2188045600 hasRelatedWork W2193950514 @default.
- W2188045600 hasRelatedWork W2566096687 @default.
- W2188045600 hasRelatedWork W2777294078 @default.
- W2188045600 hasRelatedWork W2878058130 @default.
- W2188045600 hasRelatedWork W857107425 @default.
- W2188045600 isParatext "false" @default.
- W2188045600 isRetracted "false" @default.
- W2188045600 magId "2188045600" @default.
- W2188045600 workType "article" @default.