0% found this document useful (0 votes)
18 views13 pages

Literature Survey On The Application of

This literature survey examines the application of cryptography in various modern technologies, focusing on its role in securing communication across distributed systems like cloud computing, IoT, and blockchain. It highlights the latest cryptographic techniques, including public-key cryptography, hash algorithms, and dynamic authentication methods, while addressing emerging threats from quantum computing. The paper emphasizes the importance of robust cryptographic measures to protect sensitive data and maintain security in an increasingly interconnected digital landscape.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views13 pages

Literature Survey On The Application of

This literature survey examines the application of cryptography in various modern technologies, focusing on its role in securing communication across distributed systems like cloud computing, IoT, and blockchain. It highlights the latest cryptographic techniques, including public-key cryptography, hash algorithms, and dynamic authentication methods, while addressing emerging threats from quantum computing. The paper emphasizes the importance of robust cryptographic measures to protect sensitive data and maintain security in an increasingly interconnected digital landscape.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Literature survey on the application of

cryptography in modern technologies

Ganga Bhattacharjee, Dr.Hari Om

Abstract: In this modern era of technology, the world is surrounded by applications


based on the Internet. The communication network where the number of nodes that are
connected forms a distributed system.The commonly used distributed system is the
cloud. The challenge is to protect the network from malicious attackers and hackers
who can tamper with the communication channel and seize valuable information. This
research paper will discuss the latest applications of cryptography in modern
technologies for secure communication.

Index Terms: Cryptography, application, blockchain, quantum computing.

1. Introduction
Cryptography is the art of maintaining secret information by hiding it through
encryption tech- niques. We review the latest trends in cryptography applications.
This literature survey discusses how cryptographic techniques are applied in
multimedia content to preserve the security of con- tent transmission from sender to
receiver.Public-key cryptography and hash algorithm are widely used in blockchain
technology. The emerging trend of quantum computing proves the attacks that may
arise in public cryptosystems. The literature survey reviews the latest attacks
that can occur in blockchain technology. The literature survey also discusses the
incremental hash function method for enhanced security. This article also reviews
the cryptography methods used in the Internet of Things for secure communication
between machine-to-machine interaction. The cryptography application in the GSM
mobile communication network provides voice transmission security features used in
the transmission of speech and verbal communication. The literature survey
discusses deep learning and machine learning solutions along with the federated
learning model and their security features in maintaining decentralized applications.
This literature survey studies the various cryptographic techniques used in artificial
intelligence and neural networks to solve complex derivations. In addition, the paper
has reviewed dynamic cryptography methods.We have reviewed research papers
based on the cloud-based Internet of Things along with advanced quantum
computing technology used in preserving security and privacy. In this survey paper,
we have reviewed how cryptography can play an important role in preserving
security and information in maintaining medical documents.Application of
cryptography in blockchain technology like bitcoin where IOT device-based
transaction powered by threshold cryptography. In this literature survey, we have
introduced the applications of cryptography in allied IOT devices with advanced
encryption standards to maintain a high level of security. In addition, we review the
application of cryptography in wireless networks.In this literature survey, we have
Vol. , No. Page 1
,
discussed the cryptography method used in the health care system that describes
the deep federated learning scheme method for the digital health care system. Data
breach and financial fraud are increasing enormously in order to provide maximum
security strength to the system,it is necessary to think above more than one

Vol. , No. Page 2


,
login to avoid frauds,In this survey we have reviewed the research application based
on dynamic authentication asymmetric key along with multiple digital signature
scheme.

2. Literature Survey
This literature survey presents the systematic review of research work related to the
use of cryptography techniques used in modern technologies in the field of cyber
security, machine learning, deep learning, artificial netowrk, IOT, wirelss network etc.
Due to the ever increasing data in the network that is growing rapidly in the network
environment there is a need to use a systematic approach to maintain security and
prevent threats with advance use of cryptographic techniques.

2.0.0.a.
Ricci et al. [13] In 2021
In this research paper author has discussed about the hashing and encryption
techniques are important for security.Security through cryptography depends on
strong key management,which majorly depends on right key provided on right
hand.The author has also reviewed about the secrecy in maintaining security that
can be fragile,further stated that security must depend upon certain public key
algorithm like RSA and AES where AES is widely used.The author has dis- cussed
about the modern cryptography techniques like stream cipher ,block cipher,digital
signature used for message authentication.

2.0.0.b.
Alexandre Braga et al.[3] In 2019
This research work Pointed out nine main categories easily recognized by software
developer tak- ing security as major viewpoint.they are weak cryptography,bad
randomness handling,coding and implementation bugs,design flaws,improper
certificate validation and public key cryptography,poor key
management,cryptography architecture and nonce management.To specify how
developer may face cryptographic misuse the profile related to three aspects of
cryptography misuse related to specific likelihood of occurrence,likelihood of
detection and complexity of avoidance.The author could able to find out with an
example though DES is detected by all the cryptographic tool as misuse erroneously
(false positive).

2.0.0.c.
SuYunling et al.[20]
In review of cryptography and network security, to prevent the data from disclosing
and in order to grantee safety in the network medium,the author has mentioned
about the cryptographic hash function in the field of information security.this paper
provides an over view of XOR and PICH scheme for incremental hash functions based
on pair block chaining .The cryptographic hash function discussed in this paper is to
prevent forgery and integrity protection on the document that is intended to change
frequently.

2.0.0.d.
Chinmay Vyas et.al [18] IN 2014
The author proposed about the tamper detection and recovery approach in visual
cryptography methods.The need for digital watermarking is increasing tremendously
due majority of digital con- tents.The algorithm for water marking for sensitive image
is proposed that are robust against the image processing attacks.The author has
Vol. , No. Page 3
,
proposed latest work in the filed of visual cryptography
.They have discussed about the code book and boolean logic operation that are used
to prevent attackers.The DWT used for secure secret share and public share to
improve the security and robustness of the image .

Vol. , No. Page 4


,
2.0.0.e.
TIAGO M et al. [5] In 2020
Blockchain is an emerging technology that is dependent on cryptographic
techniques. In [5] TIAGO M et al. described the blockchain as a decentralized
application with a hash algorithm that shares information in peer-to-peer networks
that do not trust each other. They have proposed the applications of blockchain in
innovative health, e-voting in supply chain management, etc. Blockchain works on
public key cryptography and hash function. They analyzed the adverse effects of
quantum-computing attacks and pointed out some post-quantum cryptosystems to
minimize the attacks. They have briefly reviewed the major quantum threats on
blockchain for future researchers.

2.0.0.f.
Malka N. Halgamuge et al.[7] In 2023
In 2023 The study of an IOT with a Blockchain-enabled technology can scale the
device capabilities if the time duration for block validation is reduced.[7]. Digital
twinning of IOT is one of the important research areas in the field of cyber security
and cyber-attacks. They proposed a model to examine block generation and
estimated time to access a block in an IOT environment to obtain a suitable
blockchain framework. The research article reveals the fact that block generation
time can be effectively reduced with 256-bit ECC, further for validating the block the
fog layer is utilized to improve the efficiency of the blockchain with the appropriate
encryption algorithm.

2.0.0.g.
Shyam Kumar Sinha et al.[16] IN 2024
In the case of a public permission-less blockchain framework, it is necessary to have
a robust consensus mechanism within the nodes in the blockchain network. They
have proposed a crypto- graphic hash function algorithm that can efficiently reduce
the computation required for the mining process to access and verify a new block to
add to the blockchain network. They have introduced a hashing method for supply
chain management to achieve the deadline.

2.0.0.h.
ALBERTUS ANUGERAH PEKERTI et al. [12] IN 2024
This paper reviews encryption techniques for voice communication. They have
discussed the steganography and chaotic cryptography in detail and concluded that
these techniques provides high throughput and better quality services and i
compromised for real-time voice communica- tion. Further, they have identified the
security challenges on end-end voice communication and proposed speech coding
technique and multiple excitation sources to enhance the capability to implement
standard security algorithms.

2.0.0.i.
Qiuhua Wang et al.[19] In 2022
This paper discusses the selfish mining attacks on proof of work consensus
mechanisms in blockchain systems.They pointed out that SDoS success comes from
opponent-specific mining strategies and a fair mining game. Further future work
based on machine-learning-based infor- mation stealing is discussed in this review
paper.

2.0.0.j.
Tian et al. [17] IN 2023

Vol. , No. Page 5


,
In this paper, the author has discussed the disadvantages of a centralized system
and also pointed out the challenges present in a centralized system, they have
suggested a method to decentralize the healthcare management system to a
decentralized environment where information is private and not dependent on third-
party resource management. In this paper, they have discussed federated deep
learning concepts to preserve patients’ private information and other healthcare-

Vol. , No. Page 6


,
related information. Further counter mode method is used for the data sharing
scheme to avoid data leaks.

2.0.0.k.
Run-Hua Shi and Hui Yu [15] IN 2023
This research paper introduced the technology like blockchain that overcomes
almost all the attacks that includes both symmetric and asymmetric cryptosystem,
further they pointed out the challenges and opportunities of post-quantum
cryptosystem in technology like blockchain ,bitcoin and IOT devices .

2.0.0.l.
Richa Maurya et al. [11] IN 2020
This paper discusses the Extended Visual Cryptography Technique (EVCT) for
medical image security. They performed a comparative study on both steganography
and visual cryptography. They concluded that visual cryptography is more robust
against various attacks. They proposed a circular shift encryption algorithm to cover
the image using an encryption algorithm with three shares of color described as red,
gray, and colored, similarly circular shift is applied to decrypt the encrypted secret
image.

2.0.0.m.
Ahmet Kurt et al.[10]
The paper proposes Lightning Network (LN) which has brought the innovative
concept of off-chain payment method to minimize the drawback of bitcoin’s heavy
transaction fees and low throughput. Method: They identified that bitcoin and LN are
not feasible in IOT devices due to hardware and software restrictions. They
proposed a protocol that allows both LN and bitcoin to incorporate in IOT devices
with untrusted gateway node to send and receive payments. The game theoretic
security analysis proves IOT device does not lose payment even if other peer nodes
attempt to cheat.

2.0.0.n.
SALMAN AHMED et al. [1] IN 2025
This paper has discussed the advanced encryption standards used in IOT devices to
provide high-security standards. They reviewed the latest architectural design of AES
and pointed out their impact on gate count, area, maximum frequency, and power
consumption throughput in field programmable gate arrays and integrated circuits.
This research paper identified the challenges in lightweight AES and security
challenges and addressed the measures taken to balance security with design
efficiency.

2.0.0.o.
Aaditya Jain and Sourabh Soni [8] IN 2017
This research work has identified the drawbacks of biometric-based authentication of
customers in banking systems is more fragile for the hackers to attack the database
with the biometric information. To avoid this kind of attack, they have introduced the
method of visual cryptosystems in which information is hidden within the system
and only the user’s visual system can able to decrypt the information. This paper
mainly discusses the major issues in identity theft and customer data security in joint
account transactions and proposes a method that is based on (2, 2)-VCSXOR. Their
experimental results are the same as that of the original secret image.

2.0.0.p.
Aniello Castiglione et al [4] IN 2024
In this research article, the method to reduce Quantum computing attacks on
Vol. , No. Page 7
,
blockchain-based IOT devices is discussed.The existing cryptography techniques
cannot identify. They have per- formed experiments based on the post-quantum
digital signature algorithm Dilithium-5, ensuring

Vol. , No. Page 8


,
blockchain security and quantum technology. The experimental results prove to be
efficient in quantum-resistant security while improving the performance of real-world
IOT applications.

2.0.0.q.
Aaditya Jain and Sourabh soni [8]IN 2017
This research work has identified the drawbacks of biometric-based authentication of
customers in banking systems is more fragile for the hackers to attack the database
with the biometric information. To avoid this kind of attack, they have introduced the
method of visual cryptosystem in which information is hidden within the system
and only the user’s visual system can able to decrypt the information. This paper
mainly discusses the major issues in identity theft and customer data security in joint
account transactions and proposes a method that is based on (2, 2)-VCSXOR. Their
experimental results are the same as that of the original secret image.

2.0.0.r.
MOSBAH ALOWN et al.[2] IN 2025
The research work aims to describe an electronic e-voting system using
blockchain technol- ogy. They discussed the key concepts of consensus mechanism,
performance evaluation, and cryptographic tools. The survey highlights the
cryptographic primitives used in e-voting systems. They discussed homomorphic
encryption, blind signatures, and zero-knowledge proofs. Which increases the fast
verification process, and privacy and prevents double voting.

2.0.0.s.
MANJIT KAUR et al.[9]IN 2023
This research paper discusses the IOT devices which work on public network that are
vulnerable to threats and attacks.to provide high level of security for IOT devices
they have used elliptic Galois cryptography approach along with matrix XOR
steganography to provide secure connectivity for IOT devices. The encrypted data
is embedded into cover block of images with optimization algorithm to obtain
security in data transmission, their experimental results have shown EGCrypto gives
more appropriate results than other cryptographic techniques.

2.0.0.t.
Rui Zhang et al.[21] IN 2021
This research paper has proposed a method to provide security in group-oriented
applications like Zoom and Microsoft Teams over an internet network. They have
come up with the protocol for group-oriented communication and introduced a slot
multi-signature model with Chosen Ciphertext Attack where sender maintains
integrity.

2.0.0.u.
Hemant Ghayvat et al.[6] IN 2021 The medical information is gathered in cloud
system. The cloud based system belongs to third party hence they are more prone to
data violation and attacks. The research work aims to enhance security with
blockchain technology which works on decentralized environment. The authors
suggested Blockchain technology to preserve confidentiality and secu- rity. The first
phase is elliptic curve cryptography with a digital signature for secure
communication. The second phase safeguards the attacker’s two-step authentication
framework with an integrated RSA and AES algorithm.

2.0.0.v.
MUHAMMAD IMRAN SARWAR et al. [14] IN 2023
Vol. , No. Page 9
,
This paper reviews the power of blockchain and Bitcoin technology. Both this
technology proves to be robust against any method of attacks this papers studies
robustness for attacks discussed in public cryptosystem and symmetric key
cryptosystems. Further, they discussed the opportunities of post-quantum
cryptosystem that can be a threat or opportunity to blockchain technology.

Vol. , No. Page


, 10
3. Conclusion
This literature survey covers some of the latest technologies where security is a
significant concern when data is transmitted over the network environment. This
paper reviews the various attacks and threats on the internet. Further, this paper is
about how cryptography methods were used in IOT devices, visual cryptography,
quantum computing, blockchain, and bitcoin to provide security to devices running
on the internet platform.

Acknowledgement
The authors wish to thank the anonymous reviewers for their valuable suggestions

References
[1] Salman Ahmed, Nabihah Ahmad, Nasir Ali Shah, Ghulam E Mustafa Abro, Ardhi Wijayanto,
Abdinasir Hirsi, and Abdul Rehman Altaf. Lightweight aes design for iot applications: Optimizations in
fpga and asic with dfa countermeasure strategies. IEEE Access, 2025.
[2] Mosbah Alown, Mehmet Sabir Kiraz, and Muhammed Ali Bingol. Enhancing democratic processes: A
survey of dre, internet, and blockchain in electronic voting systems. IEEE Access, 2025.
[3] Alexandre Braga, Ricardo Dahab, Nuno Antunes, Nuno Laranjeiro, and Marco Vieira. Understanding
how to use static analysis tools for detecting cryptography misuse in software. IEEE Transactions on
Reliability, 68(4):1384– 1403, 2019.
[4] Aniello Castiglione, Jacopo Gennaro Esposito, Vincenzo Loia, Michele Nappi, Chiara Pero, and Matteo
Polsinelli. Integrating post-quantum cryptography and blockchain to secure low-cost iot devices. IEEE
Transactions on Industrial Informatics, 2024.
[5] Tiago M Fernandez-Carames and Paula Fraga-Lamas. Towards post-quantum blockchain: A review on
blockchain cryptography resistant to quantum computing attacks. IEEE access, 8:21091–21116, 2020.
[6] Hemant Ghayvat, Sharnil Pandya, Pronaya Bhattacharya, Mohd Zuhair, Mamoon Rashid, Saqib Hakak,
and Kapal Dev. Cp-bdhca: Blockchain-based confidentiality-privacy preserving big data scheme for
healthcare clouds and applications. IEEE Journal of Biomedical and Health Informatics, 26(5):1937–1948,
2021.
[7] Malka N Halgamuge, Geetha K Munasinghe, and Moshe Zukerman. Time estimation for a new
block generation in blockchain-enabled internet of things. IEEE Transactions on Network and Service
Management, 21(1):535–557, 2023.
[8] Aaditya Jain and Sourabh Soni. Visual cryptography and image processing based approach for secure
transactions in banking sector. In 2017 2nd International Conference on Telecommunication and Networks
(TEL-NET), pages 1–5. IEEE, 2017.
[9] Manjit Kaur, Ahmad Ali AlZubi, Tarandeep Singh Walia, Vaishali Yadav, Naresh Kumar, Dilbag Singh,
and Heung-No Lee. Egcrypto: A low-complexity elliptic galois cryptography model for secure data
transmission in iot. IEEE Access, 11:90739–90748, 2023.
[10] Ahmet Kurt, Kemal Akkaya, Sabri Yilmaz, Suat Mercan, Omer Shlomovits, and Enes Erdin. Lngate
ˆ{2}2: Secure bidirectional iot micro-payments using bitcoin’s lightning network and threshold
cryptography. IEEE Transactions on Mobile Computing, 23(5):6027–6044, 2023.
[11] Richa Maurya, Ashwani Kumar Kannojiya, and B Rajitha. An extended visual cryptography technique
for medical image security. In 2020 2nd International Conference on Innovative Mechanisms for Industry
Applications (ICIMIA), pages 415–421. IEEE, 2020.
[12] Albertus Anugerah Pekerti, Arif Sasongko, and Adi Indrayanto. Secure end-to-end voice
communication: A comprehensive review of steganography, modem-based cryptography, and chaotic
cryptography techniques. IEEE Access, 2024.
[13] Sara Ricci, Petr Dzurenda, Jan Hajny, and Lukas Malina. Privacy-enhancing group signcryption
scheme. IEEE Access, 9:136529–136551, 2021.
[14] Muhammad Imran Sarwar, Louai A Maghrabi, Imran Khan, Qamar H Naith, and Kashif Nisar.
Blockchain: A crypto- intensive technology—a comprehensive review. IEEE Access, 11:141926–
141955, 2023.
[15] Run-Hua Shi and Hui Yu. Privacy-preserving range query quantum scheme with single photons in
edge-based internet of things. IEEE Transactions on Network and Service Management, 20(4):4923–4936,
2023.
[16] Shyam Kumar Sinha and Debarka Mukhopadhyay. Time efficient hash key generation for blockchain
enabled framework. IEEE Access, 2024.
[17] Youliang Tian, Shuai Wang, Jinbo Xiong, Renwan Bi, Zhou Zhou, and Md Zakirul Alam Bhuiyan. Robust
and privacy- preserving decentralized deep federated learning training: Focusing on digital healthcare
applications. IEEE/ACM Transactions on computational biology and bioinformatics, 2023.
[18] Chinmay Vyas and Munindra Lunagaria. A review on methods for image authentication and visual
cryptography in digital image watermarking. In 2014 IEEE International Conference on Computational
Intelligence and Computing Research, pages 1–6. IEEE, 2014.

Vol. , No. Page


, 11
[19] Qiuhua Wang, Tianyu Xia, Dong Wang, Yizhi Ren, Gongxun Miao, and Kim-Kwang Raymond Choo.
Sdos: Selfish mining-based denial-of-service attack. IEEE Transactions on Information Forensics and
Security, 17:3335–3349, 2022.

Vol. , No. Page


, 12
[20] Su Yunling and Miao Xianghua. An overview of incremental hash function based on pair block
chaining. In 2010 International Forum on Information Technology and Applications, volume 3, pages 332–335.
IEEE, 2010.
[21] Rui Zhang, Lei Zhang, Kim-Kwang Raymond Choo, and Tong Chen. Dynamic authenticated
asymmetric group key agreement with sender non-repudiation and privacy for group-oriented
applications. IEEE Transactions on Dependable and Secure Computing, 20(1):492–505, 2021.

Vol. , No. Page


, 13

You might also like