Authors :
Akanni Gabriel A; Eseyin Joseph B; Kazeem A. Gbolagade
Volume/Issue :
Volume 7 - 2022, Issue 10 - October
Google Scholar :
https://bit.ly/3IIfn9N
Scribd :
https://bit.ly/3EK2nBu
DOI :
https://doi.org/10.5281/zenodo.7334218
Abstract :
More people are embracing technology today
because of the way we live, and they use it for both
electronic banking and shopping. At the same time,
knowledge protection has become more problematic.
Along with the increased use of social media, online
crime, often known as cybercrime, has become more and
more predominant. The field of information technology
places a high priority on data security. Information
security is one of the most significant issues facing the
globe today. When thinking about cyber security, we
first take into "cybercrimes," which show considerable
daily growth. To stop this type of cybercrime, various
governments and corporations take various precautions.
Numerous steps have been taken to protect against it,
but many people are also extremely concerned. This
paper briefly reviews the most up-to-date structures of
the new technology's potential threats to cyber security.
It also emphasizes advancements that affect cyber
security, philosophies, new cyber security technology,
and the nomenclature of Residue Number System (RNS)
components for the design of secret key cryptography.
The rapidity of RNS to binary conversion administers
the moduli set in RNS, allowing for the efficient
performance of operations like comparison, scaling, sign
recognition, and fault correction.
Keywords :
Cyber security, cybercrime, RNS, secret key, cyberassult and CRT.
More people are embracing technology today
because of the way we live, and they use it for both
electronic banking and shopping. At the same time,
knowledge protection has become more problematic.
Along with the increased use of social media, online
crime, often known as cybercrime, has become more and
more predominant. The field of information technology
places a high priority on data security. Information
security is one of the most significant issues facing the
globe today. When thinking about cyber security, we
first take into "cybercrimes," which show considerable
daily growth. To stop this type of cybercrime, various
governments and corporations take various precautions.
Numerous steps have been taken to protect against it,
but many people are also extremely concerned. This
paper briefly reviews the most up-to-date structures of
the new technology's potential threats to cyber security.
It also emphasizes advancements that affect cyber
security, philosophies, new cyber security technology,
and the nomenclature of Residue Number System (RNS)
components for the design of secret key cryptography.
The rapidity of RNS to binary conversion administers
the moduli set in RNS, allowing for the efficient
performance of operations like comparison, scaling, sign
recognition, and fault correction.
Keywords :
Cyber security, cybercrime, RNS, secret key, cyberassult and CRT.