2023 International Conference on Computational Intelligence, Communication Technology and Networking (CICTN) 2023
DOI: 10.1109/cictn57981.2023.10141472
|View full text |Cite
|
Sign up to set email alerts
|

Securing Data in the Internet of Things (IoT) using Metamorphic Cryptography - A Survey

M. Shreyansh Narayan,
Munesh Chandra Trivedi,
Anil Dubey
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…While AES-GCM is renowned for its rapid and efficient encryption, its effectiveness hinges on a critical operational requirement: the non-repetition of key-nonce pairings. This seemingly straightforward condition is crucial; a single lapse in AES-GCM can compromise the entire security framework [17][18][19][20]. Beyond specific algorithmic weaknesses, a broader challenge in cryptography is achieving a balance among confidentiality, authenticity, and integrity.…”
Section: Introductionmentioning
confidence: 99%
“…While AES-GCM is renowned for its rapid and efficient encryption, its effectiveness hinges on a critical operational requirement: the non-repetition of key-nonce pairings. This seemingly straightforward condition is crucial; a single lapse in AES-GCM can compromise the entire security framework [17][18][19][20]. Beyond specific algorithmic weaknesses, a broader challenge in cryptography is achieving a balance among confidentiality, authenticity, and integrity.…”
Section: Introductionmentioning
confidence: 99%