A Residue Number System and Secret Key Crypto System Review in Cyber Security


Authors : Akanni Gabriel A; Eseyin Joseph B; Kazeem A. Gbolagade

Volume/Issue : Volume 7 - 2022, Issue 10 - October

Google Scholar : https://bit.ly/3IIfn9N

Scribd : https://bit.ly/3EK2nBu

DOI : https://doi.org/10.5281/zenodo.7334218

Abstract : More people are embracing technology today because of the way we live, and they use it for both electronic banking and shopping. At the same time, knowledge protection has become more problematic. Along with the increased use of social media, online crime, often known as cybercrime, has become more and more predominant. The field of information technology places a high priority on data security. Information security is one of the most significant issues facing the globe today. When thinking about cyber security, we first take into "cybercrimes," which show considerable daily growth. To stop this type of cybercrime, various governments and corporations take various precautions. Numerous steps have been taken to protect against it, but many people are also extremely concerned. This paper briefly reviews the most up-to-date structures of the new technology's potential threats to cyber security. It also emphasizes advancements that affect cyber security, philosophies, new cyber security technology, and the nomenclature of Residue Number System (RNS) components for the design of secret key cryptography. The rapidity of RNS to binary conversion administers the moduli set in RNS, allowing for the efficient performance of operations like comparison, scaling, sign recognition, and fault correction.

Keywords : Cyber security, cybercrime, RNS, secret key, cyberassult and CRT.

More people are embracing technology today because of the way we live, and they use it for both electronic banking and shopping. At the same time, knowledge protection has become more problematic. Along with the increased use of social media, online crime, often known as cybercrime, has become more and more predominant. The field of information technology places a high priority on data security. Information security is one of the most significant issues facing the globe today. When thinking about cyber security, we first take into "cybercrimes," which show considerable daily growth. To stop this type of cybercrime, various governments and corporations take various precautions. Numerous steps have been taken to protect against it, but many people are also extremely concerned. This paper briefly reviews the most up-to-date structures of the new technology's potential threats to cyber security. It also emphasizes advancements that affect cyber security, philosophies, new cyber security technology, and the nomenclature of Residue Number System (RNS) components for the design of secret key cryptography. The rapidity of RNS to binary conversion administers the moduli set in RNS, allowing for the efficient performance of operations like comparison, scaling, sign recognition, and fault correction.

Keywords : Cyber security, cybercrime, RNS, secret key, cyberassult and CRT.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe