CRYPTOGRAPHY USE IN EVERYDAY LIFE

ავტორი: Niko Salukvadze, Lizi Gogitidze, Giorigi Adamia,
ორგანიზაცია: mtsignobart uxucesi, 51 public school

კატეგორია:

საკვანძო სიტყვები: cryptography, cyber information, encrypted
აბსტრაქტი. Cryptography plays a very important role in our everyday lives. Cryptography is used to transfer funds and data safety. It encrypts what we send so it can't be seen by anyone, other than the person we send it to or changed by a middleman. And thanks to the advances in cryptography, today we can send whatever want, without worrying about hackers getting this information. This article discusses how our information is encrypted and how secure this encryption method is.

ბიბლიოგრაფია

1.Akkar, ML., Giraud, C. (2001). An Implementation of DES and AES, Secure against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2001. CHES 2001. Lecture Notes in Computer Science, vol 2162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44709-1_26
2.Bogdanov, A., Khovratovich, D., Rechberger, C. (2011). Biclique Cryptanalysis of the Full AES. In: Lee, D.H., Wang, X. (eds) Advances in Cryptology – ASIACRYPT 2011. ASIACRYPT 2011. Lecture Notes in Computer Science, vol 7073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25385-0_19
3. Increasing Usability of TLS Certificate Generation Process Using Secure Design; G. Iashvili, M. Iavich, A. Gagnidze, S. Gnatyuk; IVUS-2020; http://ceur-ws.org/Vol-2698/; 2020.
4.Canvel, B., Hiltgen, A., Vaudenay, S., Vuagnoux, M. (2003). Password Interception in an SSL/TLS Channel. In: Boneh, D. (eds) Advances in Cryptology - CRYPTO 2003. CRYPTO 2003. Lecture Notes in Computer Science, vol 2729. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45146-4_34
5. Brier, É.,Joye, M. (2002). Weierstraß Elliptic Curves and Side-Channel Attacks. In: Naccache, D., Paillier, P. (eds) Public Key Cryptography. PKC 2002. Lecture Notes in Computer Science, vol 2274. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45664-3_24
6. Goyal, V., O’Neill, A., Rao, V. (2011). Correlated-Input Secure Hash Functions. In: Ishai, Y. (eds) Theory of Cryptography. TCC 2011. Lecture Notes in Computer Science, vol 6597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19571-6_12
7. Gagnidze, M. Iavich, G. Iashvili, Some Aspects of Post-Quantum Cryptosystems, Abstract book, EURO-ASIA FORUM IN POLITICS ECONOMICS AND BUSINESS – 2016, JULY 21-22, 2016, BELGRADE, SERBIA.