Abstract

Introduction: Cloud computing has revolutionized how individuals and businesses engage with data and software, turning the internet into a powerful computing platform by centralizing resources. Despite its benefits, there's a challenge in safeguarding sensitive information stored externally. Cryptography faces threats, particularly chosen-ciphertext attacks aiming for secret keys or system information. While more common in public-key encryption, these attacks are less frequent in symmetrically coded systems. Security efforts include validating system resilience and continuous improvement, which are vital in countering evolving threats like adaptive chosen ciphertext attacks. Method: In the evaluation model, stringent measures emphasize robust encryption for system security. Despite the planning, no ciphertext attack guarantees success, necessitating adaptive security protocols. Adaptive attacks like CCA2 expose vulnerabilities, enabling attackers to manipulate ciphertexts persistently. Result: We observe an average gain of 65% for the decryption algorithm. Efforts focus on strengthening security. The flawed 32-bit key-based encryption in the modified Cramer-Shoup structure undergoes remediation. Conclusion: Conventional uncertainties validate resilience, emphasizing continuous evaluation and enhancement to counter evolving threats.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call