Cryptography

Cryptography

Cryptography, or cryptology is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages; various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, electrical engineering, communication science, and physics. Applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.[Source: Wikipedia]

Faculty Members:

  • Dr. Laiphrakpam Dolendro Singh, Assistant Professor
  • Dr. Ripon Patgiri, Assistant Professor
  • Dr. Malaya Dutta Borah, Assistant Professor
  • Dr. Naresh Babu Muppalaneni, Assistant Professor

Patents:

Publications:

[1] Laiphrakpam Dolendro Singh, Waikhom Leepeng Singh, Digambar Brahma, Pratikshit Baruah, Sarthak Biswas, “Image compression-encryption scheme using SPIHT and chaotic systems”, Journal of Information Security and Applications, Volume 63, December 2021, 103010 , https://doi.org/10.1016/j.jisa.2021.103010

[2] Khoirom Motilal Singh, Laiphrakpam Dolendro Singh and Themrichon Tuithung, “Audio encryption using ameliorated ElGamal Public Key Encryption over finite field”, Wireless Personal Communications, 2020,  https://doi.org/10.1007/s11277-020-07897-9

[3] Aasawari Sahasrabuddhe and Laiphrakpam Dolendro Singh, “Multiple images encryption based on 3D scrambling and hyper-chaotic system”, Information Sciences, Vol. 550, pp. 252-267, March 2021,  https://doi.org/10.1016/j.ins.2020.10.031,

[4]   Khoirom Motilal Singh, Laiphrakpam Dolendro Singh and Themrichon Tuithung, “Text encryption based on Huffman coding and ElGamal cryptosystem”, Recent Patents on Engineering, doi: 10.2174/1872212114999200917144000

[5]   Arpita Banik, Zeba Shamsi and Laiphrakpam Dolendro Singh, ”An encryption scheme for securing multiple medical images” Journal of Information Security and Applications, Vol. 49, pp. 1-8, 2019, DOI:https://doi.org/10.1016/j.jisa.2019.102398

[6]  Khoirom Motilal Singh, Laiphrakpam Dolendro Singh, Themrichon Tuithung, “Cryptanalysis of multimedia encryption using elliptic curve cryptography“, Optik, Vol. 168, pp. 370-375, 2018, DOI: https://doi.org/10.1016/j.ijleo.2018.04.068.

[7]  Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Medical image encryption based on improved ElGamal encryption technique”, Optik, Vol. 147, pp. 88-102, 2018, DOI: http://dx.doi.org/10.1016/j.ijleo.2017.08.028

[8]  Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Visually Meaningful Multi-image Encryption Scheme”, Arabian Journal for Science and Engineering, 2018, DOI: https://doi.org/10.1007/s13369-018-3104-7

[9] Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “A robust image encryption scheme based on chaotic system and elliptic curve over finite field”, Multimedia  Tools Application, Vol. 77, pp. 8629–8652, 2018, DOI: https://doi.org/10.1007/s11042-017-4755-1

[10]  Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Cryptanalysis of symmetric key image encryption using chaotic Rossler system”, Optik, Vol. 135, pp. 200-209, 2017, DOI: http://dx.doi.org/10.1016/j.ijleo.2017.01.062

[11] Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Cryptanalysis of Rawatet al. Fragile Watermarking Scheme with Successful Creation of Counterfeit Watermarked Image”, International Journal of Innovations & Advancement in Computer Science, Vol. 6, Issue 3, 2017.

[12] Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Cryptanalysis of Image Encryption Scheme Based on Chaotic Tent Map”,  Int. Journal of Precious Engineering Research and Application, Vol. 1, Issue 2, 2016, pp.18-22.

[13]  Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography”, Procedia Computer Science, Vol.  54, pp. 73 – 82,  2015.

[14]  Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Image Encryption using Elliptic Curve Cryptography”, Procedia Computer Science, Vol.  54, pp. 472 – 481,  2015.

[15] Ripon Patgiri, Malaya Dutta Borah and Laiphrakpam Dolendro Singh, “SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user’s secret data” Asia Pacific Conference on Communications 2021.

[16] L Dolendro Singh, Tribid Debbarma, “A New Approach to Elliptic Curve Cryptography”,  IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2014.

[17] Ripon Patgiri, Sabuzima Nayak and Samir Kumar Borgohain, “PassDB: A Password Database with Strict Privacy Protocol using 3D Bloom Filter“, Information Sciences, Vol. 539, Issue: October 2020, pages: 157 – 176,  DOI: 10.1016/j.ins.2020.05.135

[18] Ripon Patgiri, “Rando: A General-Purpose True Random Number Generator for Conventional Computers”, The 20th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom 2021), 20-22 October 2021, Shenyang, China

[19] Ripon Patgiri, “Whisper: A Curious Case of Valid and Employed Mallory in Cloud Computing”, 8th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2021), June 26-28, 2021, Washington DC, USA, DOI: 10.1109/CSCloud-EdgeCom52276.2021.00033.

[20] Sabuzima Nayak, Ripon Patgiri and Naresh Babu Muppalaneni, “Is Bloom Filter a Bad Choice for Security and Privacy?”, IEEE 35th International Conference on Information Networking (ICOIN 2021), January 13-16, 2021, Korea

[21] Naresh Babu Muppalaneni and Ripon Patgiri, “Malware Detection using Machine Learning Approach”, International Conference on Big Data, Machine Learning and Applications (BigDML 2019), December 16-19, 2019.

[22] Ripon Patgiri, Sabuzima Nayak, and Samir Kumar Borgohain, “PassDB: A Password Database using 3D Bloom Filter“, The 21st IEEE International Conferences on High Performance Computing and Communications (HPCC’19), to be held on Sat, 10 Aug, 2019 – Mon, 12 Aug, 2019, Zhangjiajie, China,  doi: 10.1109/HPCC/SmartCity/DSS.2019.00162.

[23] Ripon Patgiri and Laiphrakpam Dolendro Singh “An Analysis on the Variants of the RSA Cryptography”, 2022 International Conference on Information Networking (ICOIN), 12-15 Jan. 2022, Jeju-si, Korea, Republic of DOI: 10.1109/ICOIN53446.2022.9687262

[24] Patgiri, R., Dutta Borah, M., Dolendro Singh, L. (2022). Data Secrecy: Why Does It Matter in the Cloud Computing Paradigm?. In: Das, B., Patgiri, R., Bandyopadhyay, S., Balas, V.E. (eds) Modeling, Simulation and Optimization. Smart Innovation, Systems and Technologies, vol 292. Springer, Singapore. https://doi.org/10.1007/978-981-19-0836-1_42

[25] Arpita Banik, Laiphrakpam Dolendro Singh, Amit Agrawal and  Ripon Patgiri, “Secret image encryption based on chaotic system and Elliptic Curve Cryptography”, Digital Signal Processing, Volume 129, (2022), 103639, https://doi.org/10.1016/j.dsp.2022.103639.

[26 Laiphrakpam Dolendro Singh, Rohit Thingbaijam, Kh. Motilal. Singh and M. Al Awida, “Encrypting Multiple Images With an Enhanced Chaotic Map,” in IEEE Access, vol. 10, pp. 87844-87859, 2022, doi: 10.1109/ACCESS.2022.3199738.