• {{ child.heading }}

Quick access

{{child.heading}}

CAC - Chair of Applied Cryptography

dissertation topics in cryptography

Theses (Bachelor/Master)

We offer thesis topics related to cryptography, IT security and Blockchain technologies. Our major areas of research are:

  • Hardware cryptography: for example, designing new cryptographic primitives that are provably secure against side-channel attacks, analyzing existing countermeasures and benchmarking their efficiency.
  • Scalability of blockchains: for example, investigating how to improve the efficiency and transaction throughput of blockchain technology.
  • Security of blockchain: for example, attacking the privacy or robustness of existing cryptocurrencies.
  • Cryptographic protocols: for example, designing cryptographic protocols that guarantee fairness by using smart contracts, or preserve privacy by using zero-knowledge proof systems.

We offer both more theoretical and applied thesis topics. A theoretical thesis may include a literature survey, security models and a formal security analysis of a security/cryptographic/blockchain protocols. In a more applied thesis you will implement new primitives and protocols and benchmark their performance (according to various measures). Alternatively, you may also try to attack existing cryptographic/security/blockchain systems.

If you are interested please do not hesitate to contact us via [email protected].

Supervised Master and Diploma Theses

Some example proposals are listed below. However, these are just samples. If you are interested in doing a thesis with us, we advise to check out our research web-pages and contact us for further topics.

Access restricted section: Log in to see this section .

General Information

Requirements.

We expect that undergraduate students preparing a Bachelor thesis show a strong interest in topics related to our lectures. Bachelor theses may be written in German or English. Please choose German if you have difficulties drafting a flawless document in English.

A Master thesis should have substantial knowledge in at least one sub-field of security or cryptography, and they should have prior experience with the research methodology they plan to use. The default language for Master theses is English.

We only supervise student from TU Darmstadt. In exceptional cases we supervise Master students at a company. In this case you need to write a proposal (ca. 2 pages) highlighting why your topic is important for our research.

Recommendation

Candidates are expected to be familiar with the general instructions for writing a thesis at the Department of Computer Science.

Please consider the following options to find a topic of the thesis:

  • Consult our web-pages on research and our projects.
  • If you have an idea for an interesting topic that matches the research area of one of our team members, you may also contact him/her and propose your own topic. The decision to supervise will be made by the potential supervisor.

Chair of Applied Cryptography

dissertation topics in cryptography

office.cac@cysec.de

work +49 6151 16-25716

Work S2|20 307 Pankratiusstraße 2 64289 Darmstadt

We would like to customise the information and usability of this website to your preferences and needs. To this end, we use so-called cookies. Please choose which cookies you would like to enable when visiting our webpages. Some of these cookies are required to load and correctly display this website on your device. These are strictly necessary or essential cookies and cannot be deselected. The preferences cookie saves your language setting, while the statistics cookie regulates how the open-source statistical software “Matomo” analyses your visits to and activities on our website. For more information about cookies we use, please refer to our privacy policy .

TOP 6 RESEARCH TOPICS IN CRYPTOGRAPHY

Cryptography refers to the methodology which is involved in establishing safe communication and ensuring data privacy. When messages are transformed into unperceivable content using cryptographic tools, they cannot be easily retrieved by attackers.  If you are facing any issues about your projects in cryptography then continue to read this article on research topics in cryptography.

Generating cryptographic keys, surfing over the web, establishing secure communication for instance financial transactions and personal mails, digital key signing, data protection, and verification are some of the major domains in which the algorithms of cryptography are used extensively. 

Here you can get an ultimate overview of cryptography research from the very basics. First, let us understand cryptography

What is cryptography?

  • Cryptography generally denotes the procedure involved in the conversion of usual data into indistinguishable information in a motive to protect it
  • Also the conversion of highly protected imperceptible data into normal text form a part of cryptography
  • Cryptography is of great significance in most of the everyday applications such as online electronic financial transactions and securing passwords etc.
  • Usually three kinds of cryptography methods are used at large

To get detailed descriptions and research-oriented explanations on various Cryptography methods you can reach out to our experts at any time. With a world-class reputation, experts at research topics in cryptography have earned the confidence of students from more than one hundred and fifty countries of the world. 

The crystal clear explanations of the mechanisms and principles behind the working of cryptography have gained us global recognition. If you are looking to get expert assistance for your Cryptography projects then you need to surely check out our website. We will now talk about the working of cryptography

Latest Research Areas in Cryptography

How does cryptography work?

  • Safe communication establishment amid third party interruptions by rivals is the major goal of cryptography
  • Proper algorithms and appropriate keys are deployed for transforming plain text data input to cipher text-based encrypted output
  • Identifying and authenticating participants
  • Critical data encryption
  • Unchangeable record creation involving permanent audit attempts
  • Security of the tools and techniques in cryptography
  • Cryptographic methodological complexities

Hence standard and highly reliable research support is essential to understand in more depth the tools, protocols, and software for establishing successful cryptography research projects . For this purpose, you can readily reach out to our experts who have guided an ample number of highly successful research topics in cryptography . So we are capable of handling any Visual Cryptography project . Let us now look into the principles behind the working of cryptography

What are the principles of cryptography?

The following are the key principles involved in cryptography for ensuring data transmission security demands

  • Since the Identity of both sender and receiver are revealed, one cannot deny any action of transmission that has been performed
  • The proof of both transmission and reception disable is a person from disowning or repudiation
  • A sender can usually authenticate the receiver with his or her particular identity
  • Since the identity of both the parties are validated efficiently, there is no room for missing out on the authentication
  • Cryptography also provides for an approach wherein a receiver can surely authenticate the messages received
  • Hence tampering of messages cannot be entertained
  • Only the authenticated user or receiver can read the data
  • Data can therefore be protected from Eavesdropping attacks

Keys play an important role in ensuring the secrecy and privacy of encrypted data in cryptosystems . Hence make sure that you protect the keys used in your project. All the encryption keys should never be stored in plain text in association with their respective protected data. If you do so, then it is the same as leaving the front door closed with keys on it. We are well known for such easily understandable analogies-based explanations in cryptography. The following methodologies are used commonly for key protection purposes thus ensuring greater security. 

  • Scrypt, bcrypt, and PBKDF2 are the algorithms that are used for both password generation and bootstrapping the cryptosystem
  • It is important to note that the password has to be very strong and known only to a few administrators
  • By doing all these you can ensure that unencrypted keys can be stored in any place
  • You can use Access Control Lists that are strong for protecting keys and storing them in file systems. The least privilege principle has to be followed for more security
  • Coding can be used to establish API calls to the hardware security module
  • As a result proper keys are provided at times of necessity and performing data decryption on the hardware security module becomes easy

Such suitable and proven methods are developed and compiled by our experts to make your cryptography project experience more interesting and informative. Therefore you can get access to authentic and reliable data needed for your projects from our experts. Massive resources and real-time research data on various research topics in Cryptography are available with us. Get in touch with us for a progressive research career. Let us now look into the Cryptography techniques that are commonly used

Techniques in Cryptography

Cryptography is one of the fastest-growing fields of research. The following are the important areas and methods in Cryptography

  • Privacy-enhancing and post-quantum cryptography methods
  • Message authentication codes and Lightweight cryptography
  • Lattice-based Cryptography and Multi-party threshold cryptography
  • Asymmetric and symmetric encryption based cryptanalysis 
  • Public key and quantum cryptography
  • Identity and attributes based encryption methods
  • Elliptic curve and pairing-based cryptography techniques

For an explanation regarding these Cryptography techniques and approaches , you shall feel free to contact us. Customized research support and on-time project delivery are our trademarks. The following are the commonly researched cryptography topics

  • Anonymous aggregation and signature
  • Homomorphic construct with signature
  • Homomorphic Encryption
  • Aggregate signature

The above fields are themselves quite large areas of research that can be significantly developed to include many other aspects of cryptography . Appropriate and crisp explanations and definitions regarding the keys and cryptographic protocols can be obtained from our website. In this respect let us discuss the important keys and their features in Cryptography

  • Secret key (stream cipher and block cipher)    
  • Hash Function (secure hash algorithm)
  • Diffie – Hellman – discrete algorithm
  • Ring – LWE – lattice-based
  • ECDH ECMOV – elliptic curve
  • ElGamal Encryption (discrete logarithm)
  • Niederreiter McEliece (code-based mathematical hard problem)
  • Elliptic Curve Encryption 
  • NTRUEncrypt (lattice-based)
  • RSA Robin (integer factorization)
  • ECDSA (elliptic curve)
  • NTRUSign (lattice-based)
  • RSA Digital Signature (factorization of integers)
  • McEliece (code-based)
  • ElGamal Signature (discrete logarithm based)

About these keys and their respective algorithms, you can reach out to our experts who have gained enough experience in handling all the advanced cryptography methods and approaches. As a result, we can provide you with well advanced, enhanced, and high-quality research guidance in all research topics in Cryptography. We will now give you a quick note on approaching any Cryptography projects in today’s world

How to do a research project in Cryptography?

  • Provide an overview with an ultimate picture of all the technologies being handled in your study
  • Discussions on appropriate technologies and their related applications
  • Quote the issues and problems in the field of your study
  • Discussion of research issues in the present literature
  • Addressing the sensitive views and issues
  • Mention the unaddressed but important issues
  • Summary on the future scope of research based on gaps identified

Technically skilled world-class certified engineers and developers in Cryptography are with us who can support you in all aspects of your research. The writers and content makers with us gained expertise in their respective fields due to their two decades of vast knowledge and experience in Cryptography research. So we ensure to provide you with ultimate guidance for your Cryptography research. What are the recent topics for research in cryptography?

Research Areas in Cryptography

  • Managing using integrated policies and distributed mechanisms for tolerance of intrusion
  • Defending Distributed Denial of Service attacks and detecting and responding towards intrusions
  • Advanced operating systems and ensuring the security of mobile codes
  • Wireless networks , mobile agent and mobile network security
  • Applied cryptography and enhancing reliability and security of networks

At present we are handling projects in all these topics and so our experts are well known about the plus and minus associated with them. Provided sufficient resources and proper technical guidance you can excel in any of these recent research topics in cryptography. 

Interests in creativity and innovations have made our technical team stay highly updated with recent developments. So your doubts regarding any latest cryptography advancements can be resolved instantaneously by us. Let’s now talk more about trending PhD Topics in cryptography

Top 6 Interesting Topics in Cryptography

Latest Research Topics in Cryptography

  • Lattice-based cryptanalysis using post-quantum based cryptography
  • Oblivious RAM and testable calculations using cloud computing methodologies
  • Highly secure processors like Intel SGX and cryptographic protocols such as TLS, Safe multiparty computing protocols, and SSL
  • Argon 2 and Script like memory-hard functions
  • Cryptography for handling Ethereum like smart contracts and Bitcoin-like Cryptocurrencies
  • Cryptography failure leading to attacks and cryptanalysis
  • Encrypted data computation like Fully Homomorphic Encryption and functional encryption

We insist that you interact with us for a complete discussion on the technicalities of these topics which will help you choose the best topic for you. Once you finalize your topic you can leave to us the limitations and issues in it as our engineers will handle them with more ease. With advances spurring every day in cryptography you can find a huge scope for future research in the field. In this regard let us look into the future trends in Cryptography below

Future trends in cryptography

  • Cryptography based computations and implementations in homomorphic encryptions and entrusted data sharing environment
  • An alternative approach for creating ledgers using distributed blockchain technology for enabling third party transactions in a trusted environment
  • Syn cookies and DoS attack prevention using Cryptography methods

In all these ways Cryptography is sure to impact the digital wellbeing of the future World. You will get a great career if you choose Cryptography projects as they have huge scope in both the present and near future. For all these topics of cryptography research, we provide ultimate support in designing projects, thesis writing , proposals, assignments, and publishing papers. So you can contact us anytime for expert tips and advanced guidance in any research topics in cryptography. 

Why Work With Us ?

Senior research member, research experience, journal member, book publisher, research ethics, business ethics, valid references, explanations, paper publication, 9 big reasons to select us.

Our Editor-in-Chief has Website Ownership who control and deliver all aspects of PhD Direction to scholars and students and also keep the look to fully manage all our clients.

Our world-class certified experts have 18+years of experience in Research & Development programs (Industrial Research) who absolutely immersed as many scholars as possible in developing strong PhD research projects.

We associated with 200+reputed SCI and SCOPUS indexed journals (SJR ranking) for getting research work to be published in standard journals (Your first-choice journal).

PhDdirection.com is world’s largest book publishing platform that predominantly work subject-wise categories for scholars/students to assist their books writing and takes out into the University Library.

Our researchers provide required research ethics such as Confidentiality & Privacy, Novelty (valuable research), Plagiarism-Free, and Timely Delivery. Our customers have freedom to examine their current specific research activities.

Our organization take into consideration of customer satisfaction, online, offline support and professional works deliver since these are the actual inspiring business factors.

Solid works delivering by young qualified global research team. "References" is the key to evaluating works easier because we carefully assess scholars findings.

Detailed Videos, Readme files, Screenshots are provided for all research projects. We provide Teamviewer support and other online channels for project explanation.

Worthy journal publication is our main thing like IEEE, ACM, Springer, IET, Elsevier, etc. We substantially reduces scholars burden in publication side. We carry scholars from initial submission to final acceptance.

Related Pages

Our benefits, throughout reference, confidential agreement, research no way resale, plagiarism-free, publication guarantee, customize support, fair revisions, business professionalism, domains & tools, we generally use, wireless communication (4g lte, and 5g), ad hoc networks (vanet, manet, etc.), wireless sensor networks, software defined networks, network security, internet of things (mqtt, coap), internet of vehicles, cloud computing, fog computing, edge computing, mobile computing, mobile cloud computing, ubiquitous computing, digital image processing, medical image processing, pattern analysis and machine intelligence, geoscience and remote sensing, big data analytics, data mining, power electronics, web of things, digital forensics, natural language processing, automation systems, artificial intelligence, mininet 2.1.0, matlab (r2018b/r2019a), matlab and simulink, apache hadoop, apache spark mlib, apache mahout, apache flink, apache storm, apache cassandra, pig and hive, rapid miner, support 24/7, call us @ any time, +91 9444829042, [email protected].

Questions ?

Click here to chat with us

University of Bristol Logo

  • Help & Terms of Use

Cryptography and Information Security

  • Website http://www.bris.ac.uk/engineering/research/cryptography/

United Kingdom

Student theses

  • Title (descending)

Search results

A multi-domain approach for security compliance, insider threat modelling and risk management.

Supervisor: Tryfonas, T. (Supervisor)

Student thesis : Doctoral Thesis › Doctor of Philosophy (PhD)

Analysis of Implementations and Side-Channel Security of Frodo on Embedded Devices

Supervisor: Oswald, M. E. (Supervisor) & Stam, M. (Supervisor)

A Study of Inference-Based Attacks with Neural Network Classifiers

Supervisor: Page, D. (Supervisor) & Oswald, E. (Supervisor)

A systems approach to asset management for the Clifton Suspension Bridge Trust

Supervisor: Tryfonas, T. (Supervisor) & Taylor, C. (Supervisor)

Student thesis : Doctoral Thesis › Engineering Doctorate (EngD)

Breaking boundaries for adoption of accessible high fidelity haptic feedback technologies

Supervisor: Roudaut, A. (Supervisor) & Warinschi, B. (Supervisor)

Cryptographic Access Control: Security Models, Relations and Construction

Supervisor: Warinschi, B. (Supervisor)

Engineering a platform for local peer-to-peer electricity trading

Supervisor: Chitchyan, R. (Supervisor), Delalonde, C. (External person) (Supervisor), Byrne, A. (External person) (Supervisor), Ferguson, D. (External person) (Supervisor) & Warinschi, B. (Supervisor)

Enhancing Current Software Safety Assurance Practice to Increase System Mission Effectiveness

Supervisor: May, J. (Supervisor), Tryfonas, T. (Supervisor) & Hadley, M. J. (External person) (Supervisor)

Game theory applied to cybersecurity threat mitigation - Analysis of Threshold FlipThem

Supervisor: Leslie, D. (Supervisor) & Smart, N. (Supervisor)

Handling organisational complexity with a framework of accessible founding principles

Supervisor: Oikonomou, G. (Supervisor) & Tryfonas, T. (Supervisor)

Hydrological Applications of Multi-source Soil Moisture Products

Supervisor: Han, D. (Supervisor) & Tryfonas, T. (Supervisor)

Modelling and Simulation Applications on Cyber-Physical Systems’ Security and Resilience

Supervisor: Tryfonas, T. (Supervisor) & Oikonomou, G. (Supervisor)

On the Theory and Design of Post-Quantum Authenticated Key-Exchange, Encryption and Signatures

Supervisor: Smart, N. P. (Supervisor) & Warinschi, B. (Supervisor)

Side Channel Attacks on IoT Applications

Supervisor: Oswald, M. E. (Supervisor) & Tryfonas, T. (Supervisor)

Software Defined Networking for the Industrial Internet of Things

Supervisor: Nejabati, R. (Supervisor) & Oikonomou, G. (Supervisor)

Technology innovation for improving bridge management

Supervisor: Vardanega, P. J. (Supervisor) & Tryfonas, T. (Supervisor)

Towards Dynamic, SDN-assisted Interface Bonding for Heterogeneous 802.11 Devices

Supervisor: Doufexi, A. (Supervisor) & Oikonomou, G. (Supervisor)

Usable Abstractions for Secure Programming: A Mental Model Approach

Supervisor: Rashid, A. (Supervisor) & Warinschi, B. (Supervisor)

  • Press Enter to activate screen reader mode.

Applied Cryptography Group

Master's theses, available projects.

Students interested in a thesis with the group are kindly requested to send their transcript of records, along with a CV highlighting any relevant experience in cryptography, and either a preferred topic from the proposals below or a description of their interests within cryptography , to the contact noted under Student Projects .

Note:  Students looking to start their thesis in a particular semester are encouraged to reach out to us before the end of the previous semester.

Ongoing Projects

(We recommend students currently doing a project in our group to use this Download LaTeX template vertical_align_bottom for writing their thesis.)

(Supervisor: Prof. Kenny Paterson, Joint Supervisors: Matilda Backendal, Matteo Scarlata)

End-to-end encryption (E2EE) is now the norm for Internet browsing (via TLS) and increasingly also for messaging (with apps such as WhatsApp and Signal being end-to-end encrypted by default). Somewhat surprisingly, services that offer outsourced data storage, such as cloud storage and collaborative file editing platforms, still lag behind. One of the explanations might be the complexity that arises due to the persistence of data, which makes it difficult to use ephemeral key material to achieve strong security guarantees such as forward secrecy (FS) and post-compromise security (PCS). Another is the lack of a formal security models for even basic E2E security of outsourced data storage supporting functionality such as file sharing between users. In particular, the number of potential end-points arising from file sharing increases the complexity of E2EE cloud storage compared to single client settings. This complexity also exists in messaging, as showcased by the fact that protocols for secure two-party messaging (such as e.g. the Signal protocol) have been around for quite some time, but a protocol for E2EE group chats was only very recently standardized [rfc9420]. The newly standardized group messaging protocol is called "messaging layer security" (MLS). One of the main motivations for MLS was to make E2E security for messaging in groups of size n more efficient than through the naïve construction of n^2 two-party channels, while still retaining the same high-security guarantees—including forward secrecy and post-compromise security—that we expect from modern secure messaging protocols. In this project, we will explore the possibilities for more advanced security guarantees for file sharing systems in the E2EE setting. In particular, we will aim to tackle the conflict between the required functionality (including persistent data access, and flexible group and access management) and strong security guarantees such as FS and PCS. Our initial attempt at a solution, which we call the "secure shared folder" (SSF) scheme, combines the recent advancements of group messaging from the MLS standard with a form of key ratcheting known as key regression [NDSS:FuKamKoh06]. The aim of this project is to test the practicality of the SSF scheme by implementing a proof of concept file sharing system based on this cryptographic design.

(Supervisor: Prof. Kenny Paterson, Joint Supervisors: Shannon Veitch, Dr. Lenka Mareková)

VPNs provide increased privacy to users, and are therefore commonly used to circumvent censorship. In response, certain censoring bodies have begun using more advanced traffic analysis to block VPN access. There are two main strategies for VPN blocking: blocking by address (IP addresses of a VPN service), and blocking by behaviour (identifiable characteristics of the VPN traffic). VPN fingerprinting is the process of identifying a particular VPN protocol based on its protocol features. As is common in the cat-and-mouse game of defences and attacks, circumvention developers have created new protocols intended to protect against such fingerprinting. Several VPN protocols have implemented advanced protocols for the sake of circumventing this style of fingerprinting. This project aims to determine the efficacy of these circumvention techniques, by evaluating two advanced deployments of VPN protocols for censorship circumvention: Outline VPN [Out20,RM23] and LEAP VPN [Lea22]. Both Outline and LEAP offer client and server-side tools to enable individuals as well as organisations to act as service providers. These tools utilise and build on a number of existing technologies, from OpenVPN and Shadowsocks to Tor and Snowflake, which have previously been studied only in isolation [FWW20]. The project involves providing accurate and holistic abstractions of the systems and protocols and then applying a combination of fingerprinting [XKHE23, XRJ22], cryptanalysis, and machine learning techniques to determine if the protocols have identifiable features. We focus on exploring the capabilities of VPN fingerprinting for the sake of developing stronger censorship-resistant protocols in the future. References: [XKHE23] external page https://www.usenix.org/conference/usenixsecurity24/presentation/xue call_made [XRJ22] external page https://www.usenix.org/conference/usenixsecurity22/presentation/xue-diwen call_made [Lea22] external page https://leap.se/ call_made [Out20] external page https://getoutline.org/ call_made [RM23] external page https://www.technologyreview.com/2023/09/13/1079381/google-jigsaw-outline-vpn-internet-censorship/ call_made [FWW20] external page https://www.ndss-symposium.org/ndss-paper/detecting-probe-resistant-proxies/ call_made

(Supervisor: Prof. Kenny Paterson, Joint Supervisor: Kien Tuong Truong) Cloud storage providers such as Dropbox, Google Drive and Microsoft OneDrive allow users to offload their digital storage requirements to a remote server, managed by the provider. This is convenient and can create cost savings for both individuals and organizations. All of these providers consider security against attacks from outsider threats. However, few providers address security when the server itself is compromised, and some of those that do have been shown to have devastating cryptographic vulnerabilities, as evidenced by the attacks on Mega [BHP23] and Nextcloud [CPAB23]. Even if there were existing solutions that provably provided confidentiality and integrity of files, metadata is still often leaked. As an example, some providers leak file names. As another example, the server is always aware of the access patterns of the users. All these leakages can combine to create attacks which can compromise the privacy of users. A significant problem is that, even though a multitude of end-to-end encrypted (E2EE) cloud storage solutions exist on the market, there is a lack of foundational work on the cryptographic design for such systems. In order to guide such work, we look at the current ecosystem of E2EE cloud storage solutions, analyzing their protocols, and discussing their requirements. A new cloud storage solution that promises to protect the security and privacy of users is PrivateStorage [Aut] by Least Authority [lea]. Much like MEGA and Nextcloud, they claim to provide end-to-end encryption. However, they also implement unique features like accountless authorization, which they implement with a bespoke variation of Privacy Pass [Dav18]. This mechanism allows users to access the service without the need for a traditional account, decoupling service usage from identifiable information (e.g. payment information), and thus enhancing user privacy. This should ensure protection against surveillance, invasive data analysis and profiling, even if the adversary is a nation-state actor. PrivateStorage’s model offers a promising solution that could set new standards for the industry. However, new designs and the new cryptographic and privacy related protocols always raise concerns about potential vulnerabilities. This thesis seeks to analyze the protocol in order to find possible issues or, if none are found, to prove (a selection of) the claims given by PrivateStorage. References: [Aut] Least Authority. Privatestorage. external page https://private.storage/ call_made . Accessed on 2024-02-11. [Aut21] Least Authority. Zkaps whitepaper. 2021. [BHP23] Matilda Backendal, Miro Haller, and Kenneth G. Paterson. Mega: Malleable encryption goes awry. In 2023 IEEE Symposium on Security and Privacy (SP), pages 146–163, 2023. [CPAB23] Daniele Coppola, Kenneth G. Paterson, Martin Albrecht, and Matilda Backendal. Breaking cryptography in the wild: Nextcloud. 2023. [Dav18] Alexander Davidson. Privacy pass: Bypassing internet challenges anonymously. Proceedings on Privacy Enhancing Technologies, 2018(3):164–180, 2018. [lea] Least authority, privacy matters. external page https://leastauthority.com/ call_made . Accessed on 2024-02-11

(Supervisor: Prof. Kenny Paterson, Joint Supervisor: Dr. Lenka Mareková )

In light of the mass surveillance and censorship going on in many countries, there has been continued interest in providing tools that enable their users to communicate securely and privately. This is of particular importance to groups of higher-risk users (e.g., political activists). Decentralised messaging applications offer promising solutions for such users because they do not require a central server in the middle to forward messages or manage data, thus removing a potential single point of failure as well as making it harder for communications to be monitored. Despite the strong security claims made by the designers of decentralised messaging applications, many of them employ custom cryptographic protocols and justify their security claims using only informal arguments or by way of partial code audits that only check for common vulnerabilities. Hence, it is unclear what security guarantees are provided in reality. Researchers studying these protocols often find cryptographic vulnerabilities in them, even after supposed fixes and code audits, which is illustrated in the example of Bridgefy [ABJM21, AEP22, 7AS23] and Matrix [ACDJ23]. This shows the importance of performing formal security analyses of decentralised messaging applications. Two decentralised messaging applications in particular are of core interest because they both have generally positive track records from past security audits, but their custom cryptographic protocols have yet to receive any formal security analysis. external page Delta Chat call_made  is a messaging application that builds on the existing email infrastructure. There is no central server unless all users come from the same email provider. It offers end-to-end encryption using external page Autocrypt call_made and external page CounterMITM call_made protocols, which use a subset of the OpenPGP standard. external page Briar call_made is a messaging application designed for activists, journalists, and anyone else who needs a safe, easy and robust way to communicate. Briar users can synchronize messages directly between contacts via Bluetooth, WiFi, or Tor. Our semester project [Son23] argues informally that Briar's custom cryptographic protocols are overall secure. The main objective of the project is to make a deep-dive on Delta Chat and Briar, with the primary aim of conducting a formal security analysis of their cryptographic protocols. This entails analysing their cryptographic components as well as the composition of these components and various subprotocols that the applications rely on.

References:

[7AS23] 7ASecurity. Bridgefy Pentest Report , 2023. Download https://7asecurity.com/reports/pentest-report-bridgefy.pdf vertical_align_bottom .

[ABJM21] Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, and Lenka Marekov á . Mesh messaging in large-scale protests: Breaking Bridgefy . In CT-RSA, volume 12704 of Lecture Notes in Computer Science, pages 375–398. Springer, 2021.

[ACDJ23] Martin R. Albrecht, Sof í a Celi, Benjamin Dowling, and Daniel Jones. Practically-exploitable cryptographic vulnerabilities in Matrix . Cryptology ePrint Archive, Paper 2023/485, 2023. To appear at IEEE Symposium on Security and Privacy, S&P 2023. external page https://eprint.iacr.org/2023/485 call_made .

[AEP22] Martin R. Albrecht, Raphael Eikenberg, and Kenneth G. Paterson. Breaking Bridgefy, again: Adopting libsignal is not enough . In USENIX Security Symposium, pages 269–286. USENIX Association, 2022.

[Son23] Yuanming Song. Cryptography in the wild: Briar , 2023. Download https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_YuanmingSong.pdf (PDF, 614 KB) vertical_align_bottom .

(Supervisor: Prof. Kenny Paterson, Joint Supervisor: Kien Tuong Truong )

While core cryptographic protocols such as TLS and Signal have received significant attention from the cryptographic research community, there are many products, apps, and protocols out there "in the wild" that rely on cryptographic mechanisms to protect their users that remain understudied. In particular, the amount of data stored on the cloud is projected to reach 200 Zettabytes by 2025 [Arc20], which makes cloud storage an interesting target for attackers who want access to personal data. Encryption-at-rest and encryption-in-transit can only provide a limited amount of security, given that advanced attackers (such as nation-state attackers) can actively compromise servers and thus gain access to user data. End-to-end encrypted (E2EE) cloud storage promises to allow users to keep control of their data, even when outsourcing it to the cloud. However, recent attacks on Mega [BHP22] and NextCloud [CPAB23], along with the general lack of a formal model in the literature, have raised some doubts about the security of existing implementations. Our objective is to investigate and analyse the cryptography used by other cloud storage solutions. The focus will be on applications that serve numerous or important organizations, making a possible vulnerability impactful for a large amount of users. As an example, the analysis can focus on products such as Tresorit and Sync. In more detail, we will try to understand the inner workings of the systems and provide accurate abstractions of the discovered systems and protocols. Using these abstractions, we will look for security weaknesses in these systems and/or produce security proofs for those abstractions. Any weaknesses discovered will be documented carefully, and disclosed to the affected vendors according to standard responsible disclosure practices. Our focus will be on describing how the different systems operate, what security issues were found, and (if time permits) how they were remediated.

[Arc20] Arcserve. The 2020 data attack surface report. 2020. Download https://cybersecurityventures.com/wp-content/uploads/2020/12/ArcserveDataReport2020.pdf vertical_align_bottom

[BHP22] Matilda Backendal, Miro Haller, and Kenneth G. Paterson. MEGA: malleable encryption goes awry. Download https://mega-awry.io/pdf/mega-malleable-encryption-goes-awry.pdf vertical_align_bottom

[CPAB23] Daniele Coppola, Kenneth G. Paterson, Martin Albrecht, and Matilda Backendal. Breaking cryptography in the wild: Nextcloud. Download https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf (PDF, 510 KB) vertical_align_bottom

(Supervisor: Prof. Kenny Paterson, Joint Supervisor: Jan Gilcher)

While core cryptographic protocols such as TLS and Signal have received significant attention from the cryptographic research community, there are many products, apps, and protocols out there "in the wild'' that rely on cryptographic mechanisms to protect their users that remain understudied.

The main focus of this thesis will be RocketChat, a team collaboration platform similar to Slack. RocketChat is open source and promises end-to-end encryption as well as the option of self hosting. This is a combination that is rare amongst it’s direct competitors. This has lead to adoption specifically by customers that by the nature of their business value confidentiality, such as banks (World Bank), insurance companies (Lloyd's), government agencies (US Department of Homeland Security, indirectly), but also more generally, e.g. Audio and Deutsche Bahn.

The main objective of this project is to take a deep dive into RocketChat and analyse their cryptography and its integration into a complex system from both a design aspect as well as an implementation aspect. Since RocketChat does not come with a detailed formal description of their cryptography, this will have to be derived from the existing implementation. RocketChat also has several different end-to-end encryption implementations with different security claims, as well as some integration with the Matrix protocol as part of federated rooms, resulting in a large surface for design and implementation aspects to go wrong.  

Completed Projects

Aurel Feer. Privacy Preserving String Search using Homomorphic Encryption [ Download pdf (PDF, 1.1 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Zichen Gui.

Léa Micheloud. Securing Cloud Storage with OpenPGP: An Analysis of Proton Drive [ Download pdf (PDF, 2.1 MB) vertical_align_bottom ] . Supervisor: Prof. Kenny Paterson, Co-supervisors: Matilda Backendal , Daniel Huigens (Proton AG, Zurich).

Daniel Pöllmann.   Differential Obliviousness and its Limitations . Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Tianxin Tang.

Andreas Tsouloupas.   Breaking Cryptography in the Wild: Double-Ratchet Mutations.  Supervisor: Prof. Kenny Paterson, Co-supervisors: Matteo Scarlata, Kien Tuong Truong.

Thore Göbel.   Security Analysis of Proton Key Transparency  [ Download pdf (PDF, 1 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Daniel Huigens (Proton AG, Zurich), Felix Linker.

Sina Schaeffler.  Algorithms for Quaternion Algebras in SQIsign [ Download pdf (PDF, 664 KB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Luca De Feo (IBM Research, Zurich).

Lucas Dodgson.  Post-Quantum building blocks for secure computation - the Legendre OPRF [ Download pdf (PDF, 862 KB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisors: Dr. Julia Hesse, Sebastian Faller (IBM Research, Zurich).

Mirco Stäuble.  Mitigating Impersonation Attacks on Single Sign-On with Secure Hardware [ Download pdf (PDF, 2.1 MB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisors:  Dr. Julia Hesse, Sebastian Faller (IBM Research, Zurich).

Younis Khalil . Implementing a Forward-Secure Cloud Storage System [ Download pdf (PDF, 5.6 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Dr. Felix Günther, Matilda Backendal.

Andrei Herasimau. Formal Verification of the "Crypto Refresh" Update to the OpenPGP Standard [ Download pdf (PDF, 695 KB) vertical_align_bottom ] . Supervisor: Prof. Kenny Paterson, Co-supervisor: Daniel Huigens (Proton Mail).

Benjamin Fischer. Privacy-Preserving Federated Learning for Cyber  Threat Intelligence Sharing [ Download pdf (PDF, 3.3 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Juan R. Troncoso-​Pastoriza (Tune Insight SA).

Pascal Schärli.  Security Assessment of the Sharekey Collaboration App [ Download pdf (PDF, 2.9 MB) vertical_align_bottom ] . Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr.  Bernhard Tellenbach (Armasuisse).

Lena Csomor. Bridging the Gap between Privacy Incidents and PETs [ Download pdf (PDF, 1.3 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Dr. Anwar Hithnawi, Alexander Viand, Shannon Veitch.

Ran Liao. Linear-​Time Zero-​Knowledge Arguments in Practice .  Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Jonathan Bootle (IBM Research, Zurich). Christian Knabenhans.   Practical Integrity Protection for Private Computations [ Download pdf (PDF, 873 KB) vertical_align_bottom ]. Supervisor:  Prof. Kenny Paterson, Co-supervisors: Dr.  Anwar Hithnawi,  Alexander Viand.

Ella Kummer.  Counting filters in adversarial settings [ Download pdf (PDF, 943 KB) vertical_align_bottom ] . Supervisor.  Prof. Kenny Paterson, Co-supervisors:  Dr. Anupama Unnikrishnan, Mia Filić.

Massimiliano Taverna.  Breaking Cryptography in the Wild: Web3 [ Download pdf (PDF, 1.4 MB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson.

Giacomo Fenzi.  Klondike: Finding Gold in SIKE [ Download pdf (PDF, 7.6 MB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr.  Fernando Virdia .

Kien Tuong Truong.  Breaking Cryptography in the Wild: Threema  [ Download pdf (PDF, 824 KB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisor: Matteo Scarlata.

Jonas Meier.  Diophantine Satisfiability Arguments for Private Blockchains [ Download pdf (PDF, 2.1 MB) vertical_align_bottom ].  Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Patrick Towa.

Marc Ilunga.  Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol [ Download pdf (PDF, 1.2 MB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Felix Günther .

Robertas Maleckas.  Cryptography in the Wild: Analyzing Jitsi Meet [ Download pdf (PDF, 996 KB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisor: Prof. Martin Albrecht.

Miro Haller. Cloud Storage Systems: From Bad Practice to Practical Attacks  [ Download pdf vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Matilda Backendal .

Lorenzo Laneve . Quantum Random Walks [ Download pdf vertical_align_bottom ]. Joint supervisor:  Prof. Kenny Paterson.

Florian Moser . Swiss Internet Voting [ Download pdf vertical_align_bottom ].  Supervisor: Prof. Kenny Paterson.

Moritz Winger . Automated Hybrid Parameter Selection & Circuit Analysis for FHE [ Download pdf vertical_align_bottom ]. Joint supervisor: Prof. Kenny Paterson, Co-supervisor: Alexander Viand.

Tijana Klimovic . Modular Design of the Messaging Layer Security (MLS) Protocol [ Download pdf (PDF, 1.3 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Igors Stepanovs.

Radwa Abdelbar . Post-Quantum KEM-based TLS with Pre-Shared Keys [ Download pdf (PDF, 972 KB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Dr. Felix Günther, Dr. Patrick Towa.

Raphael Eikenberg . Breaking Bridgefy, Again [ Download pdf vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Prof. Martin Albrecht.

Andreas Pfefferle . Security Analysis of the Swiss Post’s E-Voting Implementation . Supervisor: Prof. Kenny Paterson.

Mihael Liskij . Survey of TLS 1.3 0-RTT Usage [ Download pdf (PDF, 803 KB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Felix Günther.

Nicolas Klose . Characterizing Notions for Secure Cryptographic Channels [ Download pdf (PDF, 1.4 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Felix Günther.

Alexandre Poirrier . Continuous Authentication in Secure Messaging [ Download pdf vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Dr. Benjamin Dowling, Dr. Felix Günther.

Luca Di Bartolomeo . ArmWrestling: efficient binary rewriting for ARM [ Download pdf (PDF, 661 KB) vertical_align_bottom ]. Joint Supervisor: Prof. Kenny Paterson.

Matteo Scarlata . Post-Compromise Security and TLS 1.3 Session Resumption [ Download pdf (PDF, 1.5 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Benjamin Dowling.

Anselme Goetschmann . Design and Analysis of Graph Encryption Schemes [ Download pdf (PDF, 2.9 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Sikhar Patranabis.

Lara Bruseghini . Analysis of the OpenPGP Specifications and Usage . Joint Supervisor: Prof. Kenny Paterson.

Semira Einsele . Average Case Error Estimates of the Strong Lucas Probable Prime Test [ Download pdf (PDF, 893 KB) vertical_align_bottom ]. Joint Supervisor: Prof. Kenny Paterson.

Jan Gilcher . Constant-Time Implementation of NTS-KEM [ Download pdf (PDF, 3.2 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson. 

Thesis projects and finished theses with the cryptology and data security research research group at the University of Bern and in the Swiss Joint Master in Computer Science .

Thesis topics are related to our research and offered courses .

Many projects address theory and practice of cryptology and data security; some are purely theoretic but very few are only of practical nature.

Available projects for BSc and MSc theses

The indication of a BSc or MSc project type may be discussed and a smaller version of a project labeled MSc may often be carried out as a BSc thesis.

Many more projects in the research domain of the group are possible. If you would like to suggest a topic for a thesis project, please contact a team member to discuss your idea.

These projects are intended for computer-science students at the University of Bern and those enrolled in the Swiss Joint Master of Science in Computer Science . We do not offer any internships.

Current thesis projects

Completed thesis projects, instructions and templates for theses.

Once you have agreed with your supervisor on a topic and on a start- and end-date, fill in the corresponding form and complete the respective procedure:

For a BSc thesis, the form is available from the Studienfachberatung .

For a MSc thesis, follow the JMCS process .

Presentation

Every thesis must be presented near the completion or at the end of the project. Usually this occurs during the semester, within the regular seminar organized by the Cryptology and Data Security group. BSc students must also attend the seminar as a regular participant and get credit for it. The seminar’s title may vary; see the course page for details. You should agree with your supervisor in the initial stage of the thesis on where and when to present your work.

For archiving software and thesis report, log in once to the INF gitlab server with your Campus Account (small login box at the bottom). This creates your user representation inside the server. Then ask your supervisor to create a repository for the project under the group crypto-students according to the pattern:

For a seminar report you may use the sample article template used by the CRYPTO group .

For a BSc thesis a sample template is available on the Cryptography and Data Security group website .

For a Msc thesis, the sample template is available on JMCS website .

The final version of a thesis consists of a single PDF file. Printed copies are not needed. This file must also contain the signed declaration (“Erklärung”) , in which the candidate confirms that she/he personally authored the work. (Print, sign, scan, and include the declaration at the end of the thesis.)

Research advice

Computer-science research can, roughly, be divided into “systems” and “theory” projects.

In systems research, one builds, experiments, and measures. Research results are typically demonstrated through an evaluation. However, measuring the behavior of a complex system is tricky. If you measure anything in your project, then you should read and follow this useful resource:

  • Always Measure One Level Deeper ( PDF Format ), authored by John Ousterhout, a distinguished systems researcher at Stanford University.

Theoretical research demonstrates its insight in abstract form, through algorithms, protocols, and (crypto)schemes described abstractly in the computer-science dialect of the language of mathematics. Here, results are typically demonstrated through proofs. If you author a theoretical thesis, then you should read and follow some advice on mathematical writing, such as:

Mathematical Writing by Knuth, Larrabee, and Roberts ( PDF Format ). Read points 1-27 on pages 1-6.

Many guides to mathematical writing can be found online. Pick one that you like.

Writing advice

Theses are written in English. Refer to a manual of style for guidance on writing scientific texts. You should read and follow at least the first two.

Advice on writing in computer science , published by Renée Miller of the University of Toronto, is a concise summary with pointers to more material.

The BSc thesis template explains how to assemble and format the bibliography using BibTeX.

Advice on Writing, Presentation & Plagiarism from the JMCS programme.

The Elements of Style by Strunk and White is a classic style guide (it even has its own Wikipedia page!) and one can find versions online .

After finishing the thesis, some forms have to be processed:

For BSc, the advisor completes the form and hands it to the Studiensekretariat.

For MSc, you fill in parts “Finishing…” and “Pledge…” on the back of the JMCS form for MSc theses and hand this to the Studiensekretariat at Uni BE. The advisor the completes the JMCS form, fills the form of Uni BE, and hands both to the respective recipients.

Finally, follow the steps to graduate .

A New Approach of Cryptography for Data Encryption and Decryption

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

  • Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

Overview of Cryptography and Network Security

Cryptography  is basically classified into two major techniques, and they are cryptography and cryptanalysis. On the one hand,  cryptography  is the process of protecting or hiding the information through intelligent masking techniques (i.e., code the information). On the other hand,  cryptanalysis  investigates how the ciphertext is converted into plain text and vice-versa.

Due to its incredible security concern and contribution, it is largely used in many research domains and areas to improve its security aspects. Some of the current research aspects of cryptography are given as below,

  • Hashing Techniques
  • Public-Key Cryptography
  • Key Distribution and Management
  • Symmetric-Key Cryptography
  • Real-time Cryptography Applications
  • Cryptographic Security Protocols / Standards
  • Quantum Cryptography
  • Biological Cryptography
  • And many more

Network Security  is intended to develop various levels of shielding measures with an extended security scope. These measures are worked in the principle of identifying/predicting network security threats/risks to take immediate defensive response/actions. As a result, it protects the entire network information. The identification, prediction, and defensive response measures are essential to execute based on specific security policies . Few of the current research directions of the network security are given as below,

  • Incident Response System
  • Intrusion Detection and Prevention Schemes
  • Trusted Heterogeneous Networks
  • Network Security Threats, Risks and Vulnerabilities
  • Network Protection against Internet Attacks
  • Communication Technologies and Protocol Security

We hope you are clear on the fundamentals of cryptography and network security . Now, we can see the recent research areas of cryptography and network security . In truth, our research team is presently creating unbelievable contributions through our latest research topics in cryptography and network security . So, you can confidently hold your hands with us to create amazing research work.

Research Areas in Network Security

  • Heterogeneous Communication Networks
  • Cognitive Radio based Mobile Communication
  • Information Security in Self-Organized Network
  • Named data and Data / Human Centric Network
  • Ultra-band Wireless Sensor Network (UWSN)
  • Wireless Body Area Network (WBAN)
  • Cognitive Radio-Wireless Sensor Network (CR-WSN)
  • Software Defined-Wireless Sensor Network (SD-WSN)
  • Hybrid ad hoc
  • Vehicular Ad hoc
  • Cognitive Radio Ad hoc
  • Underwater Network
  • MANET / iMANET / WANET
  • Fog / Cloud-Radio Access Network (Fog-RAN / cloud-RAN)
  • Advance Cellular Networks (4G, LTEA-Pro, 5G, Beyond 5G and 6G)

Here, we have given you the achievements of cryptography while applying them in network security. For any cryptographic methods , the following are determined as the key objectives for reaching high network security .

What are the objectives of cryptography in network security?

  • Detect the attack which definitely create worst impact
  • Screen the network to monitor the behavior and activities of intruders
  • Detect the attack and analyze their effect on network after execution
  • Analyze the origin and root cause of the threats / attacks
  • Conduct in-depth inspection on different levels of attacks

Our development team is sophisticated with experienced developers, so we can solve any level of a complex issue. Here, we have given you the widely used cryptographic algorithms, classified as low-cost, lightweight, and ultra-lightweight characteristics .

Major Classifications of Cryptography Algorithms

  • Hardware Development – 2000 Gates
  • Device Capacity – AT mega 128
  • Ciphers – ECC, Grain / 128, MIBS TWINE, PRESENT, etc.
  • Software Development – 8kb RAM and 4kb ROM
  • Hardware Development – 3000 Gates
  • Device Capacity – ATiny 45, AT mega 128 and 8051 micontroller
  • Ciphers – ECC, DEXL, SOSEMANUK, CLEFIA, etc.
  • Software Development – 8kb RAM and 32kb ROM
  • Hardware Development – 1000 Gates
  • Device Capacity – ATiny 45 and 8051 microntroller
  • Ciphers – KATAN, Hummingbird, Fruitv2, QTL, etc.
  • Software Development – 256 B RAM and 4kb ROM

Research Gaps of Cryptography

Though many lightweight ciphers are introduced in cryptography, it lacks performance in any of these aspects, such as high security and low ( resource utilization, delay, internal overhead states , etc.).

Below, we can see the challenges in lightweight cryptographic techniques such as elliptic curve cryptography, stream ciphers, hash methods, and block ciphers . Our developers will pay extra attention to the following for framing lightweight security measures that assure high performance in all aspects.

CRYPTOGRAPHY LATEST ALGORITHMS

  • Decrease the usage of energy / power
  • Minimize the needs of memory
  • Enhance the speed of computation
  • Optimize the Group arithmetic and Prime Fields (PF)
  • Minimize the length of the key
  • Decrease the chip area / size
  • Minimize the Key / IV setup rotations
  • Reduce the internal state / condition
  • Decrease the message and output size
  • Make the simpler cycles
  • Model the simple key schedules
  • Decrease the key and block size for fast execution

Our current study on cryptographic techniques found that ECC is less preferable than AES because of its speed. However, ECC is considered a slow process; it meets the requirement of ultra-lightweight cryptography . Our developers are glad to share the trick to increase the ECC speed for your information. If the memory needs are minimized, then eventually, it also minimizes the ROM and RAM needs. As a result, ECC gains the first priority among others. Below, we have given the list of research fields that offer a sophisticated platform for developing cryptographic techniques enabled network security applications.

Applications of Cryptography based Network Security

  • Internet of Things
  • Industrial Internet of Things
  • Haptic / Tactile Internet of things
  • Internet of Bio / Nano-Things
  • Vehicle to Infrastructure
  • Autonomous Vehicle Driving System
  • Deep-Sea Objects Identification and Analysis
  • Healthcare and Telemedicine
  • Remote Patient Monitoring using Wearable Devices
  • 360 Degree and Ultra-High Definition Videos
  • Virtual and Augmented Reality
  • Space Travel and Satellite Communication
  • WBAN based Digital Sensing and Visualization
  • Smart Environment Modeling (smart city / home / office, etc.)

Further, we have listed the top-demanding research topics in cryptography and network security . The below-given research ideas are just the samples. More than this, we have a copious amount of novel research notions. If you have your own ideas and are looking for the best guidance to craft network security research topics , we are also ready to support you in your need.

Top 10 Latest Research Topics in Cryptography and Network Security

  • Secure Cross-Layer Architecture Design
  • Security for Critical Cyber Physical Systems
  • Insider Threats Prediction and Detection Systems
  • Modeling of Security Assured Smart Grid System
  • Data Hiding, Survivability and Watermarking
  • SDN-NFV based High Performance Security System
  • Security Protocol Performance Assessments
  • Design and Development of Ultra-Efficient Security Models
  • Security in Cloud Services and Applications
  • Identification of Multi-level Security Threats with Preventive Measures
  • Improved Privacy and Security Solutions in Wireless Communications

From a development perspective, now we can see how the network security models are designed, tested, and assessed . In order to estimate the efficiency of the network security model, we can use the following for real-time development.

How do we evaluate the performance of network security?

  • Analytical Models
  • Real-time Tests

Further, we have also listed the important tools used for network security projects developments . All these tools are specialized to meet particular requirements of the network security model. For instance: Wireshark is used to generate and analyze the network packets . Likewise, we have given the other important tools and technologies for your awareness.

  • Test the vulnerabilities of the of the network at different angles through continuous scan and access
  • Probe the available susceptibilities in the application and take immediate response to that events
  • Analyze and troubleshoot the packets, network, applications, communication protocols and more
  • Collect whole information of network including OS, computer systems, and network entities

Next, we can see about the secure transmission approaches. Basically, the performance metrics have a key player role in elevating the design of transmission approaches. However, it has high importance, the modeling of physical layer security cause different kinds of technical issues . So, it is critical to select the suitable metrics for improving reliability, resource cost (low power), transmission efficiency, and energy efficiency of the transmission approaches . Our developers will help to attain your goal in the following aspects of transmission approaches.

  • Reliability – compute in terms of privacy outage probability and capacity
  • Power cost – compute in terms of power usage (low) for promising QoS
  • Transmission Efficiency – compute in terms of maximum possible privacy degree and capacity
  • Energy Efficiency – compute in terms of amount of energy required for one bit transmission and amount of bits transmitted in one unit of energy

As mentioned earlier, the above-specified metrics are sure to increase the performance of transmission approaches. And, these metrics are adopted in the time of system modelling . Further, we have improved our skills in all security-related strategies based on recent research requirements.

Last but not least, if you want to be familiar with more updates on the latest research topics in cryptography and network security , then communicate with our team. We will surely assist you in fulfilling your needs for a fine-tuning research career.

MILESTONE 1: Research Proposal

Finalize journal (indexing).

Before sit down to research proposal writing, we need to decide exact journals. For e.g. SCI, SCI-E, ISI, SCOPUS.

Research Subject Selection

As a doctoral student, subject selection is a big problem. Phdservices.org has the team of world class experts who experience in assisting all subjects. When you decide to work in networking, we assign our experts in your specific area for assistance.

Research Topic Selection

We helping you with right and perfect topic selection, which sound interesting to the other fellows of your committee. For e.g. if your interest in networking, the research topic is VANET / MANET / any other

Literature Survey Writing

To ensure the novelty of research, we find research gaps in 50+ latest benchmark papers (IEEE, Springer, Elsevier, MDPI, Hindawi, etc.)

Case Study Writing

After literature survey, we get the main issue/problem that your research topic will aim to resolve and elegant writing support to identify relevance of the issue.

Problem Statement

Based on the research gaps finding and importance of your research, we conclude the appropriate and specific problem statement.

Writing Research Proposal

Writing a good research proposal has need of lot of time. We only span a few to cover all major aspects (reference papers collection, deficiency finding, drawing system architecture, highlights novelty)

MILESTONE 2: System Development

Fix implementation plan.

We prepare a clear project implementation plan that narrates your proposal in step-by step and it contains Software and OS specification. We recommend you very suitable tools/software that fit for your concept.

Tools/Plan Approval

We get the approval for implementation tool, software, programing language and finally implementation plan to start development process.

Pseudocode Description

Our source code is original since we write the code after pseudocodes, algorithm writing and mathematical equation derivations.

Develop Proposal Idea

We implement our novel idea in step-by-step process that given in implementation plan. We can help scholars in implementation.

Comparison/Experiments

We perform the comparison between proposed and existing schemes in both quantitative and qualitative manner since it is most crucial part of any journal paper.

Graphs, Results, Analysis Table

We evaluate and analyze the project results by plotting graphs, numerical results computation, and broader discussion of quantitative results in table.

Project Deliverables

For every project order, we deliver the following: reference papers, source codes screenshots, project video, installation and running procedures.

MILESTONE 3: Paper Writing

Choosing right format.

We intend to write a paper in customized layout. If you are interesting in any specific journal, we ready to support you. Otherwise we prepare in IEEE transaction level.

Collecting Reliable Resources

Before paper writing, we collect reliable resources such as 50+ journal papers, magazines, news, encyclopedia (books), benchmark datasets, and online resources.

Writing Rough Draft

We create an outline of a paper at first and then writing under each heading and sub-headings. It consists of novel idea and resources

Proofreading & Formatting

We must proofread and formatting a paper to fix typesetting errors, and avoiding misspelled words, misplaced punctuation marks, and so on

Native English Writing

We check the communication of a paper by rewriting with native English writers who accomplish their English literature in University of Oxford.

Scrutinizing Paper Quality

We examine the paper quality by top-experts who can easily fix the issues in journal paper writing and also confirm the level of journal paper (SCI, Scopus or Normal).

Plagiarism Checking

We at phdservices.org is 100% guarantee for original journal paper writing. We never use previously published works.

MILESTONE 4: Paper Publication

Finding apt journal.

We play crucial role in this step since this is very important for scholar’s future. Our experts will help you in choosing high Impact Factor (SJR) journals for publishing.

Lay Paper to Submit

We organize your paper for journal submission, which covers the preparation of Authors Biography, Cover Letter, Highlights of Novelty, and Suggested Reviewers.

Paper Submission

We upload paper with submit all prerequisites that are required in journal. We completely remove frustration in paper publishing.

Paper Status Tracking

We track your paper status and answering the questions raise before review process and also we giving you frequent updates for your paper received from journal.

Revising Paper Precisely

When we receive decision for revising paper, we get ready to prepare the point-point response to address all reviewers query and resubmit it to catch final acceptance.

Get Accept & e-Proofing

We receive final mail for acceptance confirmation letter and editors send e-proofing and licensing to ensure the originality.

Publishing Paper

Paper published in online and we inform you with paper title, authors information, journal name volume, issue number, page number, and DOI link

MILESTONE 5: Thesis Writing

Identifying university format.

We pay special attention for your thesis writing and our 100+ thesis writers are proficient and clear in writing thesis for all university formats.

Gathering Adequate Resources

We collect primary and adequate resources for writing well-structured thesis using published research articles, 150+ reputed reference papers, writing plan, and so on.

Writing Thesis (Preliminary)

We write thesis in chapter-by-chapter without any empirical mistakes and we completely provide plagiarism-free thesis.

Skimming & Reading

Skimming involve reading the thesis and looking abstract, conclusions, sections, & sub-sections, paragraphs, sentences & words and writing thesis chorological order of papers.

Fixing Crosscutting Issues

This step is tricky when write thesis by amateurs. Proofreading and formatting is made by our world class thesis writers who avoid verbose, and brainstorming for significant writing.

Organize Thesis Chapters

We organize thesis chapters by completing the following: elaborate chapter, structuring chapters, flow of writing, citations correction, etc.

Writing Thesis (Final Version)

We attention to details of importance of thesis contribution, well-illustrated literature review, sharp and broad results and discussion and relevant applications study.

How PhDservices.org deal with significant issues ?

1. novel ideas.

Novelty is essential for a PhD degree. Our experts are bringing quality of being novel ideas in the particular research area. It can be only determined by after thorough literature search (state-of-the-art works published in IEEE, Springer, Elsevier, ACM, ScienceDirect, Inderscience, and so on). SCI and SCOPUS journals reviewers and editors will always demand “Novelty” for each publishing work. Our experts have in-depth knowledge in all major and sub-research fields to introduce New Methods and Ideas. MAKING NOVEL IDEAS IS THE ONLY WAY OF WINNING PHD.

2. Plagiarism-Free

To improve the quality and originality of works, we are strictly avoiding plagiarism since plagiarism is not allowed and acceptable for any type journals (SCI, SCI-E, or Scopus) in editorial and reviewer point of view. We have software named as “Anti-Plagiarism Software” that examines the similarity score for documents with good accuracy. We consist of various plagiarism tools like Viper, Turnitin, Students and scholars can get your work in Zero Tolerance to Plagiarism. DONT WORRY ABOUT PHD, WE WILL TAKE CARE OF EVERYTHING.

3. Confidential Info

We intended to keep your personal and technical information in secret and it is a basic worry for all scholars.

  • Technical Info: We never share your technical details to any other scholar since we know the importance of time and resources that are giving us by scholars.
  • Personal Info: We restricted to access scholars personal details by our experts. Our organization leading team will have your basic and necessary info for scholars.

CONFIDENTIALITY AND PRIVACY OF INFORMATION HELD IS OF VITAL IMPORTANCE AT PHDSERVICES.ORG. WE HONEST FOR ALL CUSTOMERS.

4. Publication

Most of the PhD consultancy services will end their services in Paper Writing, but our PhDservices.org is different from others by giving guarantee for both paper writing and publication in reputed journals. With our 18+ year of experience in delivering PhD services, we meet all requirements of journals (reviewers, editors, and editor-in-chief) for rapid publications. From the beginning of paper writing, we lay our smart works. PUBLICATION IS A ROOT FOR PHD DEGREE. WE LIKE A FRUIT FOR GIVING SWEET FEELING FOR ALL SCHOLARS.

5. No Duplication

After completion of your work, it does not available in our library i.e. we erased after completion of your PhD work so we avoid of giving duplicate contents for scholars. This step makes our experts to bringing new ideas, applications, methodologies and algorithms. Our work is more standard, quality and universal. Everything we make it as a new for all scholars. INNOVATION IS THE ABILITY TO SEE THE ORIGINALITY. EXPLORATION IS OUR ENGINE THAT DRIVES INNOVATION SO LET’S ALL GO EXPLORING.

Client Reviews

I ordered a research proposal in the research area of Wireless Communications and it was as very good as I can catch it.

I had wishes to complete implementation using latest software/tools and I had no idea of where to order it. My friend suggested this place and it delivers what I expect.

It really good platform to get all PhD services and I have used it many times because of reasonable price, best customer services, and high quality.

My colleague recommended this service to me and I’m delighted their services. They guide me a lot and given worthy contents for my research paper.

I’m never disappointed at any kind of service. Till I’m work with professional writers and getting lot of opportunities.

- Christopher

Once I am entered this organization I was just felt relax because lots of my colleagues and family relations were suggested to use this service and I received best thesis writing.

I recommend phdservices.org. They have professional writers for all type of writing (proposal, paper, thesis, assignment) support at affordable price.

You guys did a great job saved more money and time. I will keep working with you and I recommend to others also.

These experts are fast, knowledgeable, and dedicated to work under a short deadline. I had get good conference paper in short span.

Guys! You are the great and real experts for paper writing since it exactly matches with my demand. I will approach again.

I am fully satisfied with thesis writing. Thank you for your faultless service and soon I come back again.

Trusted customer service that you offer for me. I don’t have any cons to say.

I was at the edge of my doctorate graduation since my thesis is totally unconnected chapters. You people did a magic and I get my complete thesis!!!

- Abdul Mohammed

Good family environment with collaboration, and lot of hardworking team who actually share their knowledge by offering PhD Services.

I enjoyed huge when working with PhD services. I was asked several questions about my system development and I had wondered of smooth, dedication and caring.

I had not provided any specific requirements for my proposal work, but you guys are very awesome because I’m received proper proposal. Thank you!

- Bhanuprasad

I was read my entire research proposal and I liked concept suits for my research issues. Thank you so much for your efforts.

- Ghulam Nabi

I am extremely happy with your project development support and source codes are easily understanding and executed.

Hi!!! You guys supported me a lot. Thank you and I am 100% satisfied with publication service.

- Abhimanyu

I had found this as a wonderful platform for scholars so I highly recommend this service to all. I ordered thesis proposal and they covered everything. Thank you so much!!!

Related Pages

  • skip navigation
  • Privacy Policy
  • Accessibility
  • search search
  • Campusplan Campus Map

dissertation topics in cryptography

  • Research Topics

Post-Quantum Cryptography

  • Chair Müller-Quade
  • Research Group Rupp
  • Current Projects
  • Publications
  • Completed Projects
  • Quantification of Security
  • Applied Security
  • Cryptographic Voting Procedures
  • Practical Secure Multi-Party Computation
  • Privacy and Fairness
  • Quantum Cryptography
  • Security Notions

Assuming that there will be efficient quantum computers in the "near" future, we want to investigate whether we can already make current protocols secure against quantum algorithms. The research area of post-quantum cryptography searches for secure cryptographic methods under the assumption that in the future a quantum computer can break the current methods. The danger of quantum algorithms is already real, as data can be stored and only later their encryption can be broken and thus the data can be read. This research area is not only about the secure use of these methods, but also about the transition in protocols from current cryptography to post-quantum cryptography. How do we construct cryptoagile quantum-resistant protocols?

In 2016, NIST (National Institute of Technology) declared a standardization process for post-quantum procedures. Supposed quantum-resistant algorithms are assumed to be based on lattice-, code-, and isogeny-based assumptions (and some more). The research area of post-quantum cryptography deals with the analysis of these primitives, exploration of further quantum-resistant methods and their use in theory and practice.

In the area of post-quantum cryptography, the first step is to build up a basic understanding of some underlying mathematical methods such as lattice cryptography.

Following this, we look at how far we can protect previously researched protocols against possible attackers with quantum computers. Here we replace individual primitives with primitives based on lattice-based assumptions, which are possibly quantum-resistant.

Another step also deals with cryptoagility within post-quantum protocols. Here there are different approaches and views on how the transition from the current -- called classical -- to the quantum-resistant -- called post-quantum -- cryptography can work in theory and practice without loss of security.

Studierende mit Blick auf eine Stellwand

We offer a seminar "Post-Quantum Cryptography" every winter semester. In the research-oriented seminar, topics are selected from the standardization process for post-quantum cryptography of NIST. The algorithms are based on different mathematical, supposedly quantum-resistant methods: Lattices, Codes, Isogenies and some more. No prior knowledge is required for the seminar, but we expect a high level of self-motivation. In a series of introductory lectures all participants will be brought up to a basic level before selected topics will be worked on and presented by the students.

In addition, we offer post-quantum cryptography as a topic for student theses or for the module Practice of Research.

-- Just contact us!

53 Cryptography Essay Topic Ideas & Examples

🏆 best cryptography topic ideas & essay examples, 📌 simple & easy cryptography essay titles, 👍 good essay topics on cryptography.

  • Cryptography, Asymmetric and Symmetric algorithms The encryption key is kept public and is known as the “public key” while the decryption key is kept secret and is known as the “private or secret key”.
  • History of Cryptography At the same time, one must know the origins and the first variants of ciphers to understand the complexity and features of modern cryptography. We will write a custom essay specifically for you by our professional experts 808 writers online Learn More
  • Importance of Cryptography Knowledge in the Work of an IT Project Manager For this reason, it is essential for me to know the features of cryptography algorithms as an IT project manager to ensure the security of customer information and develop the most secure and convenient product.
  • Application of Cryptography in Communications and Networks The symmetric key is encrypted by PGP in order to make it confidential; a public key is sent along with the message and each key is used only once.
  • Biometrics in Cryptography. Desirable Properties Because it is the first step, it is a critical step in the scheme because it is used to ensure that the attacker cannot gain access to the key once the system is compromised.
  • Cryptography: History and Today’s Status Cryptography or encrypting the message is just like a letter, which at the time of posting is sealed in the envelope.
  • Quantum Cryptography for Mobile Phones The increase in the sensitivity of mobile transactions and communication necessitates the need for a strong security mechanism that will protect the confidentiality of the information exchanged using these devices.
  • Cryptography: Modern Block Cipher Algorithms The algorithm was adopted in the US in 2001 by the National Institute of Standards and Technology. The structure of RC5 is Fesitel-like network and has 1 to 255 rounds.
  • Cryptography and Privacy Protection The main ethical issue is the dilemma between the privacy of a group and individuals and their safety and security, for example, on what side the government would want to maintain the privacy of its […]
  • Use Of Visual Cryptography For Binary Images
  • Solution for Cryptography and Network Security 4th Edition
  • The Danger Of Cryptography And Encryption
  • Terrorists Use of Cryptography and Data Encryption Essay
  • The History and Applications of Cryptography
  • Steganography Analysis : Steganography And Cryptography
  • The Woman Who Smashed Codes: The Untold Story of Cryptography Pioneer Elizebeth Friedman
  • Steganography And Visual Cryptography In Computer Forensics Computer Science
  • The Importance Of Cryptography And The Legislative Issues That Surround Government Access
  • The History of Practical Cryptography from Early Century BC to Modern Day
  • The Basic Model Of Visual Cryptography And The Extended Model
  • Importance Of Cryptography And Its Accompanying Security
  • Importance Of Cryptography And Its Effects On The World
  • Why Cryptography Is Important Computer Science
  • The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
  • Cryptography And Its Impact On The World Of Computing Technology
  • The Problem Of Using Public Key Cryptography For Such Attacks
  • Hybrid Cryptography Using Symmetric Key Encryption
  • The Controversy Surrounding Computer Cryptography
  • Cryptography and Steganography For Secure Communication
  • The Impact Of Modern Day Cryptography On Society Today
  • Design of a New Security Protocol Using Hybrid Cryptography Algorithms
  • Quantum Cryptography for Nuclear Command and Control
  • The Purpose and Methods of Using Hashing in Cryptography
  • The Core Items of Cryptography and Encryption
  • Developments in the Study of Cryptography
  • Cryptography : The Concept Of Public Key Cryptography
  • How Cryptography Is Related To Information Technology
  • Cryptography Is The Science Of Writing And Solving Secret
  • National Security Issues and Quantum Cryptography
  • The Role Of Cryptography In Network Security Computer Science
  • Cryptography Is A Technique For Protect Information
  • How Do You Keep A Secret: the History of Cryptography
  • On The Development Of Quantum Computers And Cryptography
  • Marketing: Cryptography and Password Breeches
  • Cryptography Is Essential For Information Systems
  • Definition and Use of Symmetric Data Cryptography and Asymmetric Data Cryptography
  • Cryptography : Using Encryption Decryption Technique
  • Taking a Look at Quantum Cryptography
  • The History Of Cryptography And How It Is Used Today
  • The Use of Prime Numbers in Cryptography
  • Understanding the Concept Behind Cryptography
  • Cryptography And The Issue Of Internet Security
  • Elliptic Curve Cryptography and Its Applications to Mobile Devices
  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2023, January 20). 53 Cryptography Essay Topic Ideas & Examples. https://ivypanda.com/essays/topic/cryptography-essay-topics/

"53 Cryptography Essay Topic Ideas & Examples." IvyPanda , 20 Jan. 2023, ivypanda.com/essays/topic/cryptography-essay-topics/.

IvyPanda . (2023) '53 Cryptography Essay Topic Ideas & Examples'. 20 January.

IvyPanda . 2023. "53 Cryptography Essay Topic Ideas & Examples." January 20, 2023. https://ivypanda.com/essays/topic/cryptography-essay-topics/.

1. IvyPanda . "53 Cryptography Essay Topic Ideas & Examples." January 20, 2023. https://ivypanda.com/essays/topic/cryptography-essay-topics/.

Bibliography

IvyPanda . "53 Cryptography Essay Topic Ideas & Examples." January 20, 2023. https://ivypanda.com/essays/topic/cryptography-essay-topics/.

  • CyberCrime Topics
  • Internet Research Ideas
  • Cyber Security Topics
  • Encryption Essay Titles
  • Cyberspace Topics
  • Internet Privacy Essay Topics
  • Cyber Bullying Essay Ideas
  • First Amendment Research Topics
  • Computer Forensics Essay Topics
  • Hacking Essay Topics
  • Fourth Amendment Essay Topics
  • Identity Theft Essay Ideas
  • Freedom Of Expression Questions
  • Sixth Amendment Topics
  • Internet of Things Topics

Do a more advanced search »

Search for dissertations about: "dissertation on cryptography"

Showing result 1 - 5 of 7 swedish dissertations containing the words dissertation on cryptography .

1. Decryption Failure Attacks on Post-Quantum Cryptography

Author : Alexander Nilsson ; Institutionen för elektro- och informationsteknik ; [] Keywords : TEKNIK OCH TEKNOLOGIER ; ENGINEERING AND TECHNOLOGY ; Post-quantum cryptography ; Code-based cryptography ; Lattice-based cryptography ; side-channel attack ;

Abstract : This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the integer factorization and the discrete logarithm problems. READ MORE

2. On Some Symmetric Lightweight Cryptographic Designs

Author : Martin Ågren ; Institutionen för elektro- och informationsteknik ; [] Keywords : TEKNIK OCH TEKNOLOGIER ; ENGINEERING AND TECHNOLOGY ; Lightweight cryptography ; integrity ; authentication ; symmetric cryptography ; stream ciphers ; block ciphers ; Grain-128a ; BEAN ; KTANTAN ; textsc{PRINTcipher} ; FCSR combiner ; related-key attack ; linear cryptanalysis ; linear correlations ; invariant subspace attack. ;

Abstract : This dissertation presents cryptanalysis of several symmetric lightweight primitives, both stream ciphers and block ciphers. Further, some aspects of authentication in combination with a keystream generator is investigated, and a new member of the Grain family of stream ciphers, Grain-128a, with built-in support for authentication is presented. READ MORE

3. Towards Privacy Preserving Micro-data Analysis : A machine learning based perspective under prevailing privacy regulations

Author : Navoda Senavirathne ; Vicenç Torra ; Maria Riveiro ; Sonja Buchegger ; Högskolan i Skövde ; [] Keywords : NATURVETENSKAP ; NATURAL SCIENCES ; Data anonymization ; data privacy ; privacy-preserving machine learning ; privacy preserving data publishing ; personal data protection ; Skövde Artificial Intelligence Lab SAIL ; Skövde Artificial Intelligence Lab SAIL ;

Abstract : Machine learning (ML) has been employed in a wide variety of domains where micro-data (i.e., personal data) are used in the training process. READ MORE

4. Deep Learning Side-Channel Attacks on Advanced Encryption Standard

Author : Huanyu Wang ; Elena Dubrova ; Mark Smith ; Francesco Regazzoni ; KTH ; [] Keywords : TEKNIK OCH TEKNOLOGIER ; ENGINEERING AND TECHNOLOGY ; Side-channel attack ; Deep learning ; Advanced Encryption Standard ; Hardware security ; Informations- och kommunikationsteknik ; Information and Communication Technology ;

Abstract : Side-channel attacks (SCAs) have become one of the most realistic threats to implementations of cryptographic algorithms. By exploiting the nonprime, unintentional physical leakage, such as different amount of power consumed by the device during the execution of the cryptographic algorithm, SCAs are able to bypass the theoretical strength of cryptography and extract the secret key. READ MORE

5. Public Key Infrastructure and its applications for resource-constrained IoT

Author : Joel Höglund ; Shahid Raza ; Thiemo Voigt ; Andrei Gurtov ; Uppsala universitet ; [] Keywords : NATURVETENSKAP ; NATURAL SCIENCES ; IoT ; PKI ; cybersecurity ; security ; asymmetric cryptography ; Contiki-NG ; Computer Science with specialization in Computer Communication ; Datavetenskap med inriktning mot datorkommunikation ;

Abstract : The Internet of Things (IoT) is rapidly expanding and IoT devices are being deployed in security-critical scenarios, such as in critical infrastructure monitoring and within e-health, and privacy-sensitive applications in hospitals and homes. With this, questions of security and safety become paramount. READ MORE

Searchphrases right now

  • consequence
  • CO2 capturing
  • Karolinska institutet
  • Administration
  • Food Science and Technology
  • Significance
  • thesis on production
  • Traffic Engineering.

Popular searches

  • photovoltaic
  • environmental school
  • Högskolan Halmstad.
  • Protection of human rights
  • wood quality
  • General principles
  • local revenue
  • Integration.
  • Receptive field

Popular dissertations yesterday (2024-04-23)

  • Prostate cancer : Aspects of screening and prognostic factors
  • Care and self-care in diabetes : a study in patients with onset of diabetes before 1975
  • Active Distributed Power Systems Functional Structures for Real-Time Operation of Sustainable Energy Systems
  • Implementing Cognitive Semantics
  • The role of WNT5A in oral squamous cell carcinoma
  • Non-conveyance within the Swedish ambulance service : A prehospital patient safety study
  • Preclinical X-Ray Fluorescence Imaging with Multifunctional Nanoparticles
  • Pathogen-mediated selection in the immune system of rodents : Exploring selection targets, functional effects and trade-offs
  • Water purification using polyelectrolyte modified cellulose fibers and filters to adsorb bacteria
  • Democracy in Action: Decentralisation in Post-Conflict Cambodia
  • Popular complementary terms: essays, phd thesis, master thesis, papers, importance, trend, impact, advantages, disadvantages, role of, example, case study.

See yesterday's most popular searches here . Dissertations.se is the english language version of Avhandlingar.se .

edugate

  • Latest Cryptography Project Topics

Cryptography refers to the security technology that deals with data protection by safe format transformation . In Cryptography, the method of encryption is employed to convert the perceivable handwritten data into an imperceptible format so that unauthorized users can not gain access to the critical information. Digital data protection is the major goal of cryptography these days.  This article provides a complete picture of Cryptography Project Topics relevant for today’s fast-growing research in the field.

Also, it is to be noted that, Cryptography is a subfield of the computer science domain where the major aim lays on transforming the original data into a nonrecognizable format which is difficult for an uncertified and unverified user to interpret. Let us first start with the definition of cryptography with a proper example

We can readily make available some of the crucial information needed for your Cryptography projects in the recent research study reported from benchmark references. With this much relevant information regarding Cryptography project topics let us now look into the most recent and suitable projects for you below

Recent Cryptography Project Topics List

  • Security for Containers and Dockers based on cryptographic methods
  • Integration of Big Data and Internet Of Things for Enhancing Data Security and Privacy
  • Lightweight Blockchain Cryptography and future technology-based cyber security applications
  • Distributing and managing keys with cryptographic methods
  • Neural Cryptography methods for ensuring security in IoT and Big Data applications and cloud
  • Providing proper control over accessing and authenticating with Neural Cryptography solutions

Complete list of interesting cryptography project topics

What is Cryptography for example?

  • Cryptography denotes the science of data protection by involving the methods of secured format transformation
  • When you use different characters to replace the letters you are making use of a S imple Cryptography method of encrypting messages which is its best example
  • The messages can be decoded by using an appropriate table of contents and grid defining the transposition of letters

Hence cryptography starts from the very basic methodology of converting letters into characters for message encryption while utilizing tabulated grid information of such conversion to decrypt the messages. We can devise solutions and projects with properly defined encryption and decryption methods. All the latest Cryptographic techniques and their descriptions can be obtained from our website. We will now talk about the purposes of cryptography methods

What is the purpose of cryptography?

The following attributes of Cryptography are considered for selecting cryptographic protocols

  • Hashing, pairings, and signing
  • Encryption and threshold cryptography
  • Commitments, ZK proofs, and homomorphic encryptions

Talk to our technical team regarding your queries in working with different cryptographic algorithms and protocols. You can then get to know about the demands and objectives of the research and real-time implementation of cryptography based on which you can choose the algorithm that suits your needs. Cryptography protocol designs have to be made with the following considerations for enhancing the system privacy and security

  • Security enhancement for outsourcing calculations
  • Public-key Cryptography without certificates
  • Preserving privacy and authentication   
  • Electronic voting and security in Multi-Party Computations
  • Key management and authentication

Therefore for all these reasons cryptography has been gaining enough significance in today’s digital world . The reliability of cryptographic methodologies can be enhanced by incorporating the latest technologies and much other advancement. Please check out our website for the list of our successful Cryptography project topics . Custom research support can be availed from our experts at your convenience. Let us now see about the methods of choosing the best Cryptography algorithms below

How to pick the best cryptography algorithm?

  • Related models of attacks
  • Demands of the side channel resistance
  • Minimal security strength
  • Acceptable range with latency being more than five nanosecond
  • Name performance features
  • Cryptography algorithms purposes such as Message Authorization, Hashing, Encryption, and Authenticated Encryption scheme and many more
  • Provides for acceptable range with RAM between 64 and 128 bytes
  • Name physical features

The best support regarding all these aspects can be obtained from the technical team of world-class certified developers and engineers. You can consider the above characteristic features for selecting the best cryptographic algorithms. Before doing so you need to have a better awareness of the existing list of cryptography algorithms about which we are going to discuss below. 

List of Cryptography algorithms

Based on the structure types Cryptography algorithms can be grouped and classified as follows

  • Simon, Robin, GOST, LBlock and MIBS
  • DESL, TEA, Camellia, SEA and ITUbee
  • DESXL, XTEA, XXTEA, FeW and KASUMI
  • IDEA, LEA and BEST – 1
  • Speck and HIGHT
  • Halka, KATAN, KeeLoq and KTANTAN
  • Piccolo, Twine and HISEC
  • CLEFIA and Twis
  • Present – GRP
  • Hummingbird and Hummingbird – 2
  • Picaro, AES, Led, Midori and Print
  • EPCBC, Present, I – Present, mCrypton, and Zorro
  • Klein, GIFT, Pride, Rectangle, and Prince
  • Puffin – 2, SKINNY, Iceberg and Noekeon

Since our experts have worked extensively on all these platforms you can get any kinds of queries regarding these solved instantly . Our engineers will provide you with all the technical notes needed to work with these algorithms. The following are the hardware and software implementation concerning LWC algorithms,

  • Key and block sizes are respectively 80 and 64
  • Tech, power, and area are respectively in the range of 0.17 micrometer, 2.34 microwatt, and 1575 GEs
  • Throughput and energy are around 200 kbps and 11.76 microjoule per bit
  • The hardware efficiency is about 126.36 kbps/KGE
  • RAM and ROM are about zero and 650 bytes respectively
  • Latency is about 10790 cycles per block and software efficiency is around 35.90 kilobytes per second per KB
  • Throughput and energy are 23.6 kilobytes per second and 43.2 microjoule per bit respectively
  • Key size and block size are around 126 and 65 respectively
  • Key and block sizes are respectively around 126 and 64
  • Tech, power, and area are respectively in the range of 0.12 micrometer, 2.96 microwatt, and 2950 GEs
  • Throughput and energy are about 533.4 kbps and 5.54 microjoule per bit
  • The hardware efficiency revolves around 181.58 kbps/KGE
  • RAM and ROM are in the range of about zero and 1100 bytes respectively
  • Latency is 3610 cycles per block and software efficiency is around 63.8 kilobytes per second per KB
  • Throughput and energy are respectively 70.6 kilobytes per second and 14.3 microjoule per bit
  • Key size and block size are around 125 and 66 respectively
  • Key and block sizes are both equal to 128
  • Tech, power, and area are respectively in the range of 0.34 micrometer, 4.66 microwatt, and 2590 GEs
  • Throughput and energy are around 3.45 kbps and 1362.24 microjoule per bit
  • The hardware efficiency is about 1.30 kbps/KGE
  • RAM and ROM are around 365 and 35 bytes respectively
  • Latency is about 23516 cycles per block and software efficiency is around 59.60 kilobytes per second per KB
  • Throughput and energy are 21.6 kilobytes per second and 95.7 microjoule per bit respectively
  • Key size and block size are both 128
  • Key and block sizes are valued at 128
  • Tech, power, and area are respectively in the range of 0.12 micrometer, 2.3 microwatt, and 2410 GEs
  • Throughput and energy are 56.60 kbps and 42.36 microjoule per bit
  • The hardware efficiency is about 23.5 kbps/KGE
  • RAM and ROM are in the range of zero and 917 bytes respectively
  • Latency is about 4190 cycles per block and software efficiency is around 132.8 kilobytes per second per KB
  • Throughput and energy are 120 kilobytes per second and 16.6 microjoule per bit respectively
  • Key and block sizes are both 80 and 65 respectively
  • Tech, power, and area are respectively in the range of 0.12 micrometer, 1.45 microwatt, and 1465 GEs,
  • Throughput and energy are around 246 kbps and 5.97 microjoule per bit
  • The hardware efficiency is around 167.65 kbps/KGE
  • Key and block sizes are both 126 and 64 respectively
  • Tech, power, and area are respectively in the range of 0.07 micrometer, 60.7 microwatt, and 1540 GEs
  • Throughput and energy are around 400 kbps and 1.60 microjoule per bit
  • The hardware efficiency is around 258.3 kbps/KGE
  • Key and block sizes are both 128 and 65 respectively
  • Tech, power, and area are respectively in the range of 0.34 micrometer, 4.65 microwatt, and 2595 GEs
  • Throughput and energy are around 33.50 kbps and 136.60 microjoule per bit
  • The hardware efficiency is about 12.90 kbps/KGE
  • RAM and ROM are in the range of 28 and 1075 bytes respectively
  • Latency is about 16456 cycles per block and software efficiency is around 14.40 kilobytes per second per KB
  • Throughput and energy are 15.6 kilobytes per second and 66 microjoule per bit respectively
  • Key size and block size are both 96 and 64 respectively
  • Key and block sizes are both 125 and 65 respectively
  • Tech, power, and area are respectively in the range of 0.17 micrometer, 8.70 microwatt, and 5816 GEs
  • Throughput and energy are around 401 kbps and 21.80 microjoule per bit
  • The hardware efficiency is around 68.75 kbps/KGE
  • Tech, power, and area are respectively in the range of 0.17 micrometer, 1.63 microwatt, and 1082 GEs
  • Throughput and energy are around 5.3 kbps and 314.70 microjoule per bit
  • The hardware efficiency is around 4.6 kbps/KGE

Both in the aspects of technical design and the literary needs associated with these algorithms you can get the best support in the form of real-time implemented examples, practical demonstrations, and complete explanations from our research guidance facility. We can also render complete expert guidance and assistance for thesis, proposals, cryptography project topics and cryptography assignments using the above-mentioned algorithms. For efficient completion of your project, you can confidently reach out to us. Let us now see the constraints associated with the Cryptography algorithms

Limitations of cryptography algorithms

  • The presence of some weak key classes is one of the major disadvantages in Blowfish
  • You can expect to encounter attacks of second-order differential in the four different rounds of blowfish
  • The weak keys lead to unreliability in using Blowfish
  • The involvement of equivalent keys in TEA algorithms which reduces the size of keys to one hundred and twenty-six bits
  • Key attacks in two hundred twenty-three related key pairs chosen (in 232 complexities) are also vulnerable
  • The characteristic features of different components in MARS at times become functionally complex
  • MARS hardware implementation becomes complex and hard even though major issues are not observed in MARS
  • The thirty-two round operations of AES Serpent makes it slower
  • And also the implementation of the small block of Serpent is found to be highly complex
  • The attacks are prone to happen in the cipher mathematical parts of AES Rijndael
  • The implementation of the inverse cipher on the smart card is relatively inaccurate when compared to cipher
  • The key attacks concerning the chosen keys can be seen in the Twofish platform
  • As a result the algorithm security is greatly reduced in implementations like hash functions and many more
  • Complete arbitrariness can never be attained until seventeen algorithm rounds concerning one set of weak keys in this RC6 algorithm
  • No more major issues are encountered with RC6
  • You can easily encounter key based attacks and differential attacks in 3DES
  • Man-in-the-middle attacks are also common in this algorithm
  • Cryptanalysis and weak keys are the major vulnerabilities in DES Platform
  • Brute force attacks are also the serious issue in DES
  • Differential related key attacks are common in the reduced versions of CAST usually (in the version of sixty-four bit variant)
  • One related key query can be used to break about two hundred and seventeen plaintexts (out of 248)
  • Weak key susceptibilities along with the minimal versions of rounds are commonly seen in the IDEA platform
  • Collision attacks are also common in IDEA
  • You can expect related key differential timing attacks and key schedule attacks in the first three rounds of the eight IDEA rounds

Our subject research experts in Cryptography are working with the single goal to solve the issues and challenges associated with the new Cryptography algorithms and protocols. And also we have gained a very huge experience of handling about fifteen thousand Research and projects in multiple Cryptography project topics associated with various arenas. 

Multiple other research issues and struggles have been reported by final year students and cryptography research scholars from the world’s top universities. We have been engaging with them regularly providing them with the Best Possible Solutions, Feasible Prototypes, Achievable Project Plans, Acquired Authentic Resources, Legitimate Research Data, Novelties and Advances , and many more, thus making their work easier than ever. Let us now have a look into the new kinds of cryptography algorithms below,

Novel Cryptography Algorithms

  • Lightweight Encryption and Reduced Round Camellia Algorithms
  • Enhanced Blowfish Algorithm and Lightweight Speck Encryption Algorithm
  • DWT based symmetric algorithm with MultiChaos
  • Cha-Cha 20 Encryption Algorithm
  • Hybrid of Hyperelliptic curve cryptography algorithm
  • Improved Camellia based Chaotic Map Key Generation
  • Chaotic Map-based Camellia Encryption Algorithm
  • Lucifer and Deoxys algorithms
  • CLEFIA algorithm and Counter mode AES

Owing to the novelty of these algorithms, researchers say, there are only a very few experts who are capable of solving the issues in them. In such a scenario, we are here with more than twenty years of research experience in advanced cryptography project topics involving all the novel, recent and creative approaches. 

Our experts are capable of dealing with all kinds of cryptography algorithms with great ease. Therefore you can surely reach out to us for writing algorithms and implementing codes. The following domains are some of the emerging trends in cryptography

Emerging Trends for Cryptography based projects

Emerging Trends of Cryptography

  • Improving the scalability and privacy aspects in blockchain technology
  • Mobile sensor-based sensitive data retrieval
  • Applications of internet of things like MANET and VANET
  • Electronic voting cryptography and its algorithms for post-quantum applications
  • Designing and implementing smart cards IoT based on cryptographic methods
  • Cryptography in implementation of algorithms for medical device implantation and wearable

These cryptography emerging trends are highly favorable research areas for our engineers. Usually, our technical experts share a common page with top researchers of the world in cryptography, which seems to be a quite indispensable aspect to support our customers as well as research advancements in the field.

Many successful projects have been delivered by our experts on all these topics. The strong partnership and alliances that our experts hold with customers from top research institutions have made us work with more awareness on their procedures and formats. We strictly adhere to research principles of confidentiality, professionalism, novelty, and zero plagiarism . Get in touch with us for all types of phd guidance and support on any Cryptography project topics . We are always happily ready to help you.

Related Pages

Services we offer.

Mathematical proof

Pseudo code

Conference Paper

Research Proposal

System Design

Literature Survey

Data Collection

Thesis Writing

Data Analysis

Rough Draft

Paper Collection

Code and Programs

Paper Writing

Course Work

IMAGES

  1. What is Cryptography?

    dissertation topics in cryptography

  2. Top 12 Interesting Cryptography Topics for Project [PhD & MS Support]

    dissertation topics in cryptography

  3. What is Cryptography? Types.

    dissertation topics in cryptography

  4. Top 15+ Interesting Cryptography Thesis Titles for PhD & MS Scholars

    dissertation topics in cryptography

  5. Top 10 Latest Research Topics in Cryptography and Network Security

    dissertation topics in cryptography

  6. PhD Research Topics in Cryptography [Top 6 Interesting Titles]

    dissertation topics in cryptography

VIDEO

  1. Mastering Research: Choosing a Winning Dissertation or Thesis Topic

  2. Top 3 #Dissertation topics of 2024

  3. CS8792 Cryptography and network security important questions

  4. 5 Trending Project / Dissertation Ideas for Bsc & Msc Microbiology Students

  5. Transportation Dissertation Topics

  6. 10+ Psychology Dissertation Topics for Students

COMMENTS

  1. (PDF) Mathematics for Cryptography: A Guide to Mathematical

    This article provides an overview of various cryptography algorithms, discussing their mathematical underpinnings and the areas of mathematics needed to understand them.

  2. PDF On the Implementation of Pairing-based Cryptosystems a Dissertation

    A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE AND THE COMMITTEE ON GRADUATE STUDIES OF STANFORD UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS ... Pairing-based cryptography has become a highly active research area. We define bilinear maps, or pairings, and show how they give rise to cryptosystems with new functionality

  3. PDF A Graduate Course in Applied Cryptography

    A Graduate Course in Applied Cryptography Dan Boneh and Victor Shoup Version 0.5, Jan. 2020. Preface Cryptography is an indispensable tool used to protect information in computing systems. ... expand on the material and discuss topics not covered in the chapter. Status of the book The current draft contains part I and most of parts II and III ...

  4. Theses

    Theses (Bachelor/Master) We offer thesis topics related to cryptography, IT security and Blockchain technologies. Our major areas of research are: Hardware cryptography: for example, designing new cryptographic primitives that are provably secure against side-channel attacks, analyzing existing countermeasures and benchmarking their efficiency.

  5. TOP 6 RESEARCH TOPICS IN CRYPTOGRAPHY

    Latest Research Topics in Cryptography. Lattice-based cryptanalysis using post-quantum based cryptography. Oblivious RAM and testable calculations using cloud computing methodologies. Highly secure processors like Intel SGX and cryptographic protocols such as TLS, Safe multiparty computing protocols, and SSL.

  6. PDF Quantum Cryptography

    1.1The beginnings of cryptography Cryptography is the science, at the crossroads of mathematics, physics, and computer science, that tends to design protocols to prevent malicious third-party from reading private messages. Even if the development of computers during the 20th century made the research in cryptography explode,

  7. (PDF) A Review Paper on Cryptography

    Cryptography has the importa nt purpose of providing reliabl e, strong, and robust network and data security. In this paper, we. demonstrated a review of some of the research that has been ...

  8. Cryptography and Information Security

    On the Theory and Design of Post-Quantum Authenticated Key-Exchange, Encryption and Signatures. Author: Delpech De Saint Guilhem, C. P. R., 21 Mar 2021. Supervisor: Smart, N. P. (Supervisor) & Warinschi, B. (Supervisor) Student thesis: Doctoral Thesis › Doctor of Philosophy (PhD) File.

  9. PDF Statistical Methods in Cryptography

    In this thesis, we build upon existing techniques and constructions in three different topics: blockciphers, hash functions, and encryption schemes. One common theme in our methods is the focus on statistical techniques. Another theme is that the results obtained are in contrast with their computational counterparts—the corresponding

  10. Master's Theses

    Available Projects. Students interested in a thesis with the group are kindly requested to send their transcript of records, along with a CV highlighting any relevant experience in cryptography, and either a preferred topic from the proposals below or a description of their interests within cryptography, to the contact noted under Student Projects. ...

  11. Theses

    Thesis projects and finished theses with the cryptology and data security research research group at the University of Bern and in the Swiss Joint Master in Computer Science.. Thesis topics are related to our research and offered courses.. Many projects address theory and practice of cryptology and data security; some are purely theoretic but very few are only of practical nature.

  12. PDF NUMBER THEORY IN CRYPTOGRAPHY

    cryptography to allow for easier comprehension of speci c cryptosystems. 2.1.1. Divisibility and Prime Numbers. Prime numbers are an elementary part of number theory that all readers must understand. First, consider all positive integers besides 1, e.g. 2, 3, 4, etc. We can divide these numbers into two types: prime numbers and composite numbers.

  13. PDF A Study of Lightweight Cryptography a Thesis Submitted to The Graduate

    standardize lightweight algorithms. In this thesis, we first explain what lightweight cryptography is, along with its target devices and performance metrics and give two examples of lightweight algorithms, block cipher PRESENT and stream cipher TRIV-IUM. After that, we summarize the Lightweight Cryptography Project and give its timeline.

  14. Electronic Thesis/Dissertation

    Four key-encapsulation mechanisms remain in the fourth round for further evaluation. To better understand security, risks, and other related issues in the theory, designs, implementations, and deployment of post-quantum cryptography, in this thesis, I study the following topics.1.

  15. A New Approach of Cryptography for Data Encryption and Decryption

    Cryptography is the solution to secure data from different security risks. To enhance the security of communication systems better cryptosystems technology is obvious in the area of cryptography. Our research focuses on data encryption and decryption technique for a better cryptosystem; where we have proposed a new approach that ensures better ...

  16. (PDF) Cryptography

    Department of Telecommunication Science, University of Ilorin. [email protected]. Ab stract—The wide use of cryptography is a necessary. consequence of the information ...

  17. Dissertations / Theses: 'Cryptography'

    Consult the top 50 dissertations / theses for your research on the topic 'Cryptography.'. Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

  18. Cryptography

    About 1155 item dissertation in line with Cryptography query results,the following is 1 to 50(Search took 0.068 seconds) Research on Digital Image Scrambling Algorithm, LiYongJiang / Xi'an University of Electronic Science and Technology ,1/0. Analysis and Research on the Integration of M2M Networks and3GPP Networks, SunMin / Xi'an University of ...

  19. Latest Research Topics in Cryptography and Network Security

    Test the vulnerabilities of the of the network at different angles through continuous scan and access. Zed Attack Proxy - Monitoring the security features of web applications. Probe the available susceptibilities in the application and take immediate response to that events. Wireshark - Analyze the packet information.

  20. KIT

    The research area of post-quantum cryptography deals with the analysis of these primitives, exploration of further quantum-resistant methods and their use in theory and practice. Our research. In the area of post-quantum cryptography, the first step is to build up a basic understanding of some underlying mathematical methods such as lattice ...

  21. 53 Cryptography Essay Topic Ideas & Examples

    Cryptography, Asymmetric and Symmetric algorithms. The encryption key is kept public and is known as the "public key" while the decryption key is kept secret and is known as the "private or secret key". History of Cryptography. At the same time, one must know the origins and the first variants of ciphers to understand the complexity and ...

  22. Dissertations.se: DISSERTATION ON CRYPTOGRAPHY

    Abstract : This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the integer factorization and the discrete logarithm problems. READ MORE. 2.

  23. Latest Novel Interesting Cryptography Project Topics [Ideas + Titles]

    With this much relevant information regarding Cryptography project topics let us now look into the most recent and suitable projects for you below. ... We can also render complete expert guidance and assistance for thesis, proposals, cryptography project topics and cryptography assignments using the above-mentioned algorithms. For efficient ...