• {{ child.heading }}

Quick access

{{child.heading}}

CAC - Chair of Applied Cryptography

cryptography dissertation topics

Theses (Bachelor/Master)

We offer thesis topics related to cryptography, IT security and Blockchain technologies. Our major areas of research are:

  • Hardware cryptography: for example, designing new cryptographic primitives that are provably secure against side-channel attacks, analyzing existing countermeasures and benchmarking their efficiency.
  • Scalability of blockchains: for example, investigating how to improve the efficiency and transaction throughput of blockchain technology.
  • Security of blockchain: for example, attacking the privacy or robustness of existing cryptocurrencies.
  • Cryptographic protocols: for example, designing cryptographic protocols that guarantee fairness by using smart contracts, or preserve privacy by using zero-knowledge proof systems.

We offer both more theoretical and applied thesis topics. A theoretical thesis may include a literature survey, security models and a formal security analysis of a security/cryptographic/blockchain protocols. In a more applied thesis you will implement new primitives and protocols and benchmark their performance (according to various measures). Alternatively, you may also try to attack existing cryptographic/security/blockchain systems.

If you are interested please do not hesitate to contact us via [email protected].

Supervised Master and Diploma Theses

Title Year
Trustless incoercible sale of physical goods over a blockchain 2023
A Thorough Study of Hashed-State Contracts: Techniques, Optimizations and Evaluation 2022
Ethereum Consensus Verification in an EGo-Enclave 2022
Fractional Stake Stability in Proof-of-Stake Cryptocurrencies 2022
Platooning mit Perun Channels 2021
Efficient Cryptographic Schemes provable secure against real Side-Channel-Attacks 2021
Random Probing Security of Shift-lnvariant Functions 2021
Layer-3 Payment channels on Plasma 2021
Related Key Attack Secure Authenticated Encryption 2021
Fair Exchange Protocol over Bitcoin 2021
Analyzing the definitions and Security of Adaptor Signatures 2020
Implementation and Comparison of ECDSA Threshold Signatures 2020
Blockchain-based Public Verifiable Constant Round Multi-Party Computation against Covert Adversaries 2020
Evaluation of interoperability solutions for blockchains 2020
Designing a Plasma TEE Payment Protocol 2020
From Random Probing to Average Random Probing: Connecting Probing Models 2020
Multiparty State Channels 2019
Interactive Smart Contract-Based Fair Exchange Protocol 2019
Free Option Problem – Avoidance through Mechanism Design based on Smart Contracts 2019
On Consensus in Phantom 2019
Atomic Cross-Chain Payments 2019
Evaluation of payment channel networks for micropayments 2019
Payment and State Channels in practice 2018
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms 2018
Opportunities and Risk of Crypto-Tokens and ICOS – A Critical Analysis 2018
TeePay – Using Trusted Execution Environments for Off-chain Payment 2018
Cryptographic Techniques for Hardware Security 2018

Some example proposals are listed below. However, these are just samples. If you are interested in doing a thesis with us, we advise to check out our research web-pages and contact us for further topics.

Access restricted section: Log in to see this section .

General Information

Requirements.

We expect that undergraduate students preparing a Bachelor thesis show a strong interest in topics related to our lectures. Bachelor theses may be written in German or English. Please choose German if you have difficulties drafting a flawless document in English.

A Master thesis should have substantial knowledge in at least one sub-field of security or cryptography, and they should have prior experience with the research methodology they plan to use. The default language for Master theses is English.

We only supervise student from TU Darmstadt. In exceptional cases we supervise Master students at a company. In this case you need to write a proposal (ca. 2 pages) highlighting why your topic is important for our research.

Recommendation

Candidates are expected to be familiar with the general instructions for writing a thesis at the Department of Computer Science.

Please consider the following options to find a topic of the thesis:

  • Consult our web-pages on research and our projects.
  • If you have an idea for an interesting topic that matches the research area of one of our team members, you may also contact him/her and propose your own topic. The decision to supervise will be made by the potential supervisor.

Chair of Applied Cryptography

cryptography dissertation topics

office@cac.tu-...

work +49 6151 16-25716

Work S2|20 307 Pankratiusstraße 2 64289 Darmstadt

We would like to customise the information and usability of this website to your preferences and needs. To this end, we use so-called cookies. Please choose which cookies you would like to enable when visiting our webpages. Some of these cookies are required to load and correctly display this website on your device. These are strictly necessary or essential cookies and cannot be deselected. The preferences cookie saves your language setting, while the statistics cookie regulates how the open-source statistical software “Matomo” analyses your visits to and activities on our website. For more information about cookies we use, please refer to our privacy policy .

University of Bristol Logo

  • Help & Terms of Use

Cryptography and Information Security

  • Faculty of Engineering
  • School of Computer Science
  • Website http://www.bris.ac.uk/engineering/research/cryptography/

Student theses

  • Title (descending)

Search results

A multi-domain approach for security compliance, insider threat modelling and risk management.

Supervisor: Tryfonas, T. (Supervisor)

Student thesis : Doctoral Thesis › Doctor of Philosophy (PhD)

Analysis of Implementations and Side-Channel Security of Frodo on Embedded Devices

Supervisor: Oswald, M. E. (Supervisor) & Stam, M. (Supervisor)

A Study of Inference-Based Attacks with Neural Network Classifiers

Supervisor: Page, D. (Supervisor) & Oswald, E. (Supervisor)

A systems approach to asset management for the Clifton Suspension Bridge Trust

Supervisor: Tryfonas, T. (Supervisor) & Taylor, C. (Supervisor)

Student thesis : Doctoral Thesis › Engineering Doctorate (EngD)

Breaking boundaries for adoption of accessible high fidelity haptic feedback technologies

Supervisor: Roudaut, A. (Supervisor) & Warinschi, B. (Supervisor)

Cryptographic Access Control: Security Models, Relations and Construction

Supervisor: Warinschi, B. (Supervisor)

Engineering a platform for local peer-to-peer electricity trading

Supervisor: Chitchyan, R. (Supervisor), Delalonde, C. (External person) (Supervisor), Byrne, A. (External person) (Supervisor), Ferguson, D. (External person) (Supervisor) & Warinschi, B. (Supervisor)

Enhancing Current Software Safety Assurance Practice to Increase System Mission Effectiveness

Supervisor: May, J. (Supervisor), Tryfonas, T. (Supervisor) & Hadley, M. J. (External person) (Supervisor)

Game theory applied to cybersecurity threat mitigation - Analysis of Threshold FlipThem

Supervisor: Leslie, D. (Supervisor) & Smart, N. (Supervisor)

Handling organisational complexity with a framework of accessible founding principles

Supervisor: Oikonomou, G. (Supervisor) & Tryfonas, T. (Supervisor)

Hydrological Applications of Multi-source Soil Moisture Products

Supervisor: Han, D. (Supervisor) & Tryfonas, T. (Supervisor)

Modelling and Simulation Applications on Cyber-Physical Systems’ Security and Resilience

Supervisor: Tryfonas, T. (Supervisor) & Oikonomou, G. (Supervisor)

On the Theory and Design of Post-Quantum Authenticated Key-Exchange, Encryption and Signatures

Supervisor: Smart, N. P. (Supervisor) & Warinschi, B. (Supervisor)

Security and Resilience of Multi-Bitrate, Low-Power Lossy IoT Networks

Supervisor: Oikonomou, G. (Supervisor), Piechocki, R. J. (Supervisor) & Fafoutis, X. (Supervisor)

Side Channel Attacks on IoT Applications

Supervisor: Oswald, M. E. (Supervisor) & Tryfonas, T. (Supervisor)

Software Defined Networking for the Industrial Internet of Things

Supervisor: Nejabati, R. (Supervisor) & Oikonomou, G. (Supervisor)

Technology innovation for improving bridge management

Supervisor: Vardanega, P. J. (Supervisor) & Tryfonas, T. (Supervisor)

Towards Dynamic, SDN-assisted Interface Bonding for Heterogeneous 802.11 Devices

Supervisor: Doufexi, A. (Supervisor) & Oikonomou, G. (Supervisor)

Usable Abstractions for Secure Programming: A Mental Model Approach

Supervisor: Rashid, A. (Supervisor) & Warinschi, B. (Supervisor)

  • Press Enter to activate screen reader mode.

Applied Cryptography Group

Master's theses, available projects.

Students interested in a thesis with the group are kindly requested to send their transcript of records, along with a CV highlighting any relevant experience in cryptography, and either a preferred topic from the proposals below or a description of their interests within cryptography, to the contact noted under Student Projects .

Note:  Students looking to start their thesis in a given semester are encouraged to reach out to us before the end of the previous semester (especially if starting in spring).

Last updated: 13.08.2024

Censorship circumvention tools enable clients to access endpoints in a network despite the presence of a censor. Censors use a variety of techniques to identify content they wish to block, including filtering traffic patterns that are characteristic of proxy or circumvention protocols and actively probing potential proxy servers. In response, circumvention practitioners have developed fully encrypted protocols (FEPs), intended to have traffic that appears indistinguishable from random [FJ23]. Beyond censorship circumvention, FEPs are also broadly useful for protecting a greater amount of information leakage about which protocols a user might be employing [SP22]. A FEP is typically composed of a key exchange protocol to establish shared secret keys, and then a secure channel protocol to encrypt application data; both must avoid revealing to observers that an obfuscated protocol is in use. We call the key exchange protocol used in such a FEP an obfuscated key exchange [GSV24]. Current key exchange protocols in FEPs are all based on classical cryptography, and consequently are not quantum-safe. Motivated by the transition to quantum-safe cryptography, there has been a recent push towards developing hybrid key exchange protocols [SFG23,BB18,XW24]. In such protocols, a combination of classical and quantum-safe constructions are used such that security is guaranteed even if all but one of the components is broken. In this project, we will construct a hybrid obfuscated key exchange protocol and prove its security. In particular, we would like to develop a key exchange protocol in the style of that of obfs4 [OB4] that uses a combination of traditional (Diffie-Hellman-based) and post-quantum key exchange algorithms. The project involves constructing such a protocol and proving its security (in addition to some properties that are relevant to the censorship circumvention setting).

References:

[FJ23] Ellis Fenske and Aaron Johnson. "Security Notions for Fully Encrypted Protocols." Free and Open Communications on the Internet (2023). Issue 1, pages 24-29. [SP22] B. Schwartz and C. Patton. "The Pseudorandom Extension for cTLS." IETF Internet Draft external page https://www.ietf.org/archive/id/draft-cpbs-pseudorandom-ctls-01.html call_made . (2022). [GSV24] Felix Günther, Douglas Stebila, and Shannon Veitch. "Obfuscated Key Exchange." [SFG23] Douglas Stebila, Scott Fluhrer, and Shay Gueron. "Hybrid key exchange in TLS 1.3." IETF draft (2022). external page https://www.ietf.org/archive/id/draft-ietf-tls-hybrid-design-05.html call_made [BB19] Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila, "Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange", In 10th International Workshop on Post-Quantum Cryptography (PQCrypto 2019), pp. 206-226 (2019). [XW24] Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karolin Varner, and Bas Westerbaan. X-Wing: The Hybrid KEM You’ve Been Looking For. IACR Communications in Cryptology, Vol. 1, No. 1, 22 pages. [OB4] The Tor Project. obfs4 (The Obsfourscator) spec. external page https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/lyrebird/-/blob/HEAD/doc/obfs4-spec.txt call_made

Bitwarden [Bit] is an open source password manager and authenticator application. They claim to use strong end-to-end encryption (E2EE) as well as "zero knowledge encryption" to protect users passwords, while supporting features like secure password sharing between users. Recently, Bitwarden also launched a new product called "secrets manager" [BitSM] which is aimed at organizations and developers that need to handle cryptographic secrets. Just like the password manager, secrets manager is open source, E2EE and uses "zero knowledge encryption". Additionally, the selling point of secrets manager is access management, which allows for integration in businesses and organizations. Last but not least, Bitwarden also offers enterprise support for passkeys, through a product they call "passwordless.dev" [BitPWL]. Passkeys [Pass] are the credentials (also called FIDO credentials) of WebAuthn, a web standard for authentication published by the W3C as part of the FIDO2 Project. The idea of passkeys is to use public-key cryptography to enable passwordless authentication, upgrading the security from password-based multi-factor authentication (specified in the predecessor project FIDO U2F) to completely address the many issues that stem from the use of passwords as the root of security for cryptography. Bitwarden also support passkeys as a means of authentication to the password manager, and in their security whitepaper [BitWhite] they write: "In addition to the master password, users can choose to unlock their vaults with a passkey. This process leverages a leading-edge standard and extension for WebAuthn called the pseudo-random function or PRF, which sources key material from an authenticator. With PRF, derived keys are used in the encryption and decryption of data stored in Bitwarden Password Manager vault and Bitwarden Secrets Manager, maintaining end-to-end, zero knowledge encryption." In this project, we will do a deep-dive into the cryptography of Bitwarden. In particular, we will try to find out what "zero knowledge encryption" really means, and unravel the mystery of the public-key PRF used for their passkeys implementation. The project can then take a multitude of different directions. Perhaps it turns out that the cryptography of Bitwarden does not live up to their strong claims. If so, we will try to cryptanalyze their system and find attacks in the vein of [Mega]. But hopefully, the question marks from the documentation are simple misunderstandings, and their crypto is actually good. If so, this project will take a more theoretical turn. We will try to view the password manager through the lens of E2EE cloud storage, and see if we can capture Bitwarden in the framework of [C:BDGHP24]. This will entail reading the codebase and creating a pseudocode model of the system, which we can cast in the syntax of [C:BDGHP24]. If this works out, this model can form the basis for a proof of security of the Bitwarden password manager. However, it might also turn out that the functionality offered by Bitwarden differs enough from that of cloud storage that the framework is not a good fit. If so, we will look at these distinguishing features and how they can be formalized and potentially incorporated into the cloud storage framework.

[Bit] external page https://bitwarden.com/ call_made [BitSM] external page https://bitwarden.com/products/secrets-manager/ call_made [BitPWL] external page https://bitwarden.com/products/passwordless/ call_made [Pass] external page https://fidoalliance.org/passkeys/ call_made [BitWhite] external page https://bitwarden.com/help/bitwarden-security-white-paper/ call_made [Mega] external page https://mega-awry.io/ call_made "MEGA: Malleable Encryption Goes Awry". Matilda Backendal, Miro Haller, Kenneth G. Paterson. S&P 2023. [C:BDGHP24] "A Formal Treatment of End-to-End Encrypted Cloud Storage". Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller and Kenneth G. Paterson. To appear in CRYPTO 2024.

In 1979, Shamir [Sha79] introduced the concept of “secret sharing”, a method allowing a user to divide data into n pieces and reconstruct it if a threshold of k < n pieces is available. This concept has proved to be greatly useful, finding applications in secret management systems (e.g. HashiCorp’s vault), cryptocurrency wallets (e.g. in the form of threshold cryptosystems) and more. The protocol only involves sampling a random polynomial and evaluating n points on that polynomial, making it a deceptively simple primitive. However, many potential implementation mistakes appear in real-world software products [Tra21] due to mathematical subtleties in the protocol. As more applications incorporate secret sharing, it becomes crucial to examine whether these implementations are secure and understand the impact of any discovered vulnerabilities. The objective of this thesis is to investigate the extent to which these vulnerabilities exist in the wild. This investigation will initially involve a large number of open-source repositories, which will be analysed with a combination of manual analysis, black-box testing, or analysis engines such as CodeQL [Git21]. The investigation can then focus on a few selected products for which these vulnerabilities would have a high impact.

[Git21] Inc. Github. Codeql, 2021 ( external page https://codeql.github.com/ call_made ) [Sha79] Adi Shamir. How to Share a Secret. Commun. ACM, 22(11):612–613, 1979. ( external page https://dl.acm.org/doi/10.1145/359168.359176 call_made ) [Tra21] Trail of Bits. Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs, 2021. ( external page https://blog.trailofbits.com/2021/12/21/disclosing-shamirs-secret-sharing-vulnerabilities-and-announcing-zkdocs/ call_made )

Single Sign On (SSO) allows users to log in into multiple services or software systems using a single authentication provider. A widely known and deployed SSO standard is the relatively modern OpenID [1], but the SSO space contains a wide range of competing implementations, different products, and legacy systems, resulting in high complexity. In this project, we take a look at OpenID itself, but also Kerberos [2] and Kerberos-based systems such as Active Directory [3], OAuth and OpenID Connect [4], and potentially other targets. We formalize the security goals that these schemes try to achieve, and check that they can withstand cryptanalytic scrutiny.

[1] external page https://openid.net/developers/specs/ call_made [2] external page https://web.mit.edu/kerberos/ call_made [3] external page https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview call_made [4] external page https://oauth.net/articles/authentication/ call_made

Ongoing Projects

(We recommend students currently doing a project in our group to use this Download LaTeX template vertical_align_bottom for writing their thesis.)

(Supervisor: Prof. Kenny Paterson, Joint Supervisor: Laura Hetz)

Oblivious Message Retrieval (OMR) aims to solve the problem of anonymous message delivery. In this problem, senders write messages to receivers and post them to a public database, called bulletin board. Receivers want to retrieve their pertinent messages privately and efficiently. Metadata and access patterns of these messages thus need to be protected, as these might leak information about client relations. Naively, a receiver could download the entire board to check locally which messages are intended for them. This approach would reveal no information about their pertinent message to the server holding the bulletin board. This level of privacy comes at a significant overhead in communication and computational cost, which is linear in the size of the bulletin board. Protocols based on differential privacy or Private Information Retrieval (PIR) can reduce these costs, but require additional coordination between clients, causing additional overhead [CGBM15, BLMG21]. Protocols for OMR aim to solve this problem by outsourcing the detection of pertinent messages to one or multiple servers. These detection servers should reduce the receivers’ overhead in detecting pertinent messages while staying oblivious to these messages. First works [BLMG21, MSS+22, JLM23] considered only the detection step of this problem and required an additional (private) retrieval step in addition to their proposed solution. Recent work [LT22, WLYL23, JMK24, LSTW24, LTW24b, LTW24a] aims to provide efficient solutions for oblivious detection and retrieval combined, and with different properties such as DoS-resistance and group communication. While recent work has made significant progress, the practicality of OMR schemes is still limited, and privacy guarantees might not be sufficient in practice [SPB22]. This project aims to provide an extensive overview and comparison of the existing literature on OMR in the context of real-world use cases and related notions in cryptography, potentially improving upon the proposed schemes. First, we survey the related work and identify requirements, limitations and properties of existing schemes. These are then evaluated based on the requirements of use cases for OMR, including anonymous messaging [SG24, Tea], analytics, and payment systems [Pen]. The identified open problems and gaps are then addressed to provide a better understanding of the requirements in practice and potentially improve the current state-of-the-art. References: [BLMG21] Gabrielle Beck, Julia Len, Ian Miers, and Matthew Green. Fuzzy message detection. In CCS, pages 1507–1528. ACM, 2021. [CGBM15] Henry Corrigan-Gibbs, Dan Boneh, and David Mazières. Riposte: An Anonymous Messaging System Handling Millions of Users. In 2015 IEEE Symposium on Security and Privacy, pages 321–338. [JLM23] Sashidhar Jakkamsetti, Zeyu Liu, and Varun Madathil. Scalable private signaling. IACR Cryptol. ePrint Arch., page 572, 2023. [JMK24] Yanxue Jia, Varun Madathil, and Aniket Kate. Homerun: High-efficiency oblivious message retrieval, unrestricted. IACR Cryptol. ePrint Arch., page 188, 2024. [LSTW24] Zeyu Liu, Katerina Sotiraki, Eran Tromer, and Yunhao Wang. Dos-resistant oblivious mes- sage retrieval from snake-eye resistant PKE. IACR Cryptol. ePrint Arch., page 510, 2024. [LT22] Zeyu Liu and Eran Tromer. Oblivious message retrieval. In CRYPTO (1), volume 13507 of Lecture Notes in Computer Science, pages 753–783. Springer, 2022. [LTW24a] Zeyu Liu, Eran Tromer, and Yunhao Wang. Group oblivious message retrieval. IEEE S&P, page 534, 2024. [LTW24b] Zeyu Liu, Eran Tromer, and Yunhao Wang. Perfomr: Oblivious message retrieval with reduced communication and computation. In USENIX Security Symposium. USENIX As- sociation, 2024. [MSS+22] Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, and Denis Varlakov. Private signaling. In USENIX Security Symposium, pages 3309–3326. USENIX Association, 2022. [Pen] Penumbra. Fuzzy Message Detection - The Penumbra Protocol. external page https://protocol.penumbra.zone/main/crypto/fmd.html call_made . [SG24] Sajin Sasy and Ian Goldberg. Sok: Metadata-protecting communication systems. Proc. Priv. Enhancing Technol., 2024(1):509–524, 2024. [SPB22] István András Seres, Balázs Pejó, and Péter Burcsi. The effect of false positives: Why fuzzy message detection leads to fuzzy privacy guarantees? In Financial Cryptography, volume 13411 of Lecture Notes in Computer Science, pages 123–148. Springer, 2022. [Tea] Open Privacy Cwtch Team. Cwtch: Decentralized, Surveillance Resistant Infrastructure. external page https://cwtch.im/ call_made . [WLYL23] Zhiwei Wang, Feng Liu, Siu-Ming Yiu, and Longwen Lan. Online/offline and history indexing identity-based fuzzy message detection. IEEE Trans. Inf. Forensics Secur., 18:5553– 5566, 2023.

(Supervisor: Prof. Kenny Paterson, Joint Supervisors: Matilda Backendal, Matteo Scarlata)

End-to-end encryption (E2EE) is now the norm for Internet browsing (via TLS) and increasingly also for messaging (with apps such as WhatsApp and Signal being end-to-end encrypted by default). Somewhat surprisingly, services that offer outsourced data storage, such as cloud storage and collaborative file editing platforms, still lag behind. One of the explanations might be the complexity that arises due to the persistence of data, which makes it difficult to use ephemeral key material to achieve strong security guarantees such as forward secrecy (FS) and post-compromise security (PCS). Another is the lack of a formal security models for even basic E2E security of outsourced data storage supporting functionality such as file sharing between users. In particular, the number of potential end-points arising from file sharing increases the complexity of E2EE cloud storage compared to single client settings. This complexity also exists in messaging, as showcased by the fact that protocols for secure two-party messaging (such as e.g. the Signal protocol) have been around for quite some time, but a protocol for E2EE group chats was only very recently standardized [rfc9420]. The newly standardized group messaging protocol is called "messaging layer security" (MLS). One of the main motivations for MLS was to make E2E security for messaging in groups of size n more efficient than through the naïve construction of n^2 two-party channels, while still retaining the same high-security guarantees—including forward secrecy and post-compromise security—that we expect from modern secure messaging protocols. In this project, we will explore the possibilities for more advanced security guarantees for file sharing systems in the E2EE setting. In particular, we will aim to tackle the conflict between the required functionality (including persistent data access, and flexible group and access management) and strong security guarantees such as FS and PCS. Our initial attempt at a solution, which we call the "secure shared folder" (SSF) scheme, combines the recent advancements of group messaging from the MLS standard with a form of key ratcheting known as key regression [NDSS:FuKamKoh06]. The aim of this project is to test the practicality of the SSF scheme by implementing a proof of concept file sharing system based on this cryptographic design.

(Supervisor: Prof. Kenny Paterson, Joint Supervisors: Matteo Scarlata, Matilda Backendal)

With more and more data stored online or distributed across multiple devices, an increasing number of security-sensitive applications face the challenge of combining availability with user-friendly key management. The traditional solution is passwords, for both authentication and key derivation. Passwords often have low entropy, come from a small and predictable "dictionary'' and may be highly correlated. Consequently, the usage of password-only authentication to web services is being phased out. Instead, users are offered a two step verification process, where they need to provide a second "factor'' in addition to their password, providing a second layer of protection against attacks in the case of weak passwords. This is known as Two-Factor Authentication (2FA), or more generally, Multi-Factor Authentication (MFA). In contrast, passwords are still commonly used as the sole authentication method to derive keys for encryption using Password-Based Key Derivation Functions (PBKDFs). Examples of this include full disk encryption, client-side encryption of backups and cloud storage, password managers and cryptocurrency wallets. In this project, we harden password-based key derivation exploiting the user's possession of multiple devices, in a similar fashion to MFA. We take inspiration from the tradition of "PRF services", such as Pythia (Everspaugh, Chatterjee, Scott, Juels, Ristenpart 2015), but port them to the setting where the PRF service is operated by the users themselves, and can be lost or fall into adversarial hands. We design a cryptographic notion to capture the security of key derivation in this setting. We then aim to show that our system achieves the proposed security notion, while other state-of-the-art systems are actually too weak and fail to deliver on their security claims.

(Supervisor: Prof. Kenny Paterson, Joint Supervisors: Shannon Veitch, Dr. Lenka Mareková)

VPNs provide increased privacy to users, and are therefore commonly used to circumvent censorship. In response, certain censoring bodies have begun using more advanced traffic analysis to block VPN access. There are two main strategies for VPN blocking: blocking by address (IP addresses of a VPN service), and blocking by behaviour (identifiable characteristics of the VPN traffic). VPN fingerprinting is the process of identifying a particular VPN protocol based on its protocol features. As is common in the cat-and-mouse game of defences and attacks, circumvention developers have created new protocols intended to protect against such fingerprinting. Several VPN protocols have implemented advanced protocols for the sake of circumventing this style of fingerprinting. This project aims to determine the efficacy of these circumvention techniques, by evaluating two advanced deployments of VPN protocols for censorship circumvention: Outline VPN [Out20,RM23] and LEAP VPN [Lea22]. Both Outline and LEAP offer client and server-side tools to enable individuals as well as organisations to act as service providers. These tools utilise and build on a number of existing technologies, from OpenVPN and Shadowsocks to Tor and Snowflake, which have previously been studied only in isolation [FWW20]. The project involves providing accurate and holistic abstractions of the systems and protocols and then applying a combination of fingerprinting [XKHE23, XRJ22], cryptanalysis, and machine learning techniques to determine if the protocols have identifiable features. We focus on exploring the capabilities of VPN fingerprinting for the sake of developing stronger censorship-resistant protocols in the future. References: [XKHE23] external page https://www.usenix.org/conference/usenixsecurity24/presentation/xue call_made [XRJ22] external page https://www.usenix.org/conference/usenixsecurity22/presentation/xue-diwen call_made [Lea22] external page https://leap.se/ call_made [Out20] external page https://getoutline.org/ call_made [RM23] external page https://www.technologyreview.com/2023/09/13/1079381/google-jigsaw-outline-vpn-internet-censorship/ call_made [FWW20] external page https://www.ndss-symposium.org/ndss-paper/detecting-probe-resistant-proxies/ call_made

(Supervisor: Prof. Kenny Paterson, Joint Supervisor: Kien Tuong Truong) Cloud storage providers such as Dropbox, Google Drive and Microsoft OneDrive allow users to offload their digital storage requirements to a remote server, managed by the provider. This is convenient and can create cost savings for both individuals and organizations. All of these providers consider security against attacks from outsider threats. However, few providers address security when the server itself is compromised, and some of those that do have been shown to have devastating cryptographic vulnerabilities, as evidenced by the attacks on Mega [BHP23] and Nextcloud [CPAB23]. Even if there were existing solutions that provably provided confidentiality and integrity of files, metadata is still often leaked. As an example, some providers leak file names. As another example, the server is always aware of the access patterns of the users. All these leakages can combine to create attacks which can compromise the privacy of users. A significant problem is that, even though a multitude of end-to-end encrypted (E2EE) cloud storage solutions exist on the market, there is a lack of foundational work on the cryptographic design for such systems. In order to guide such work, we look at the current ecosystem of E2EE cloud storage solutions, analyzing their protocols, and discussing their requirements. A new cloud storage solution that promises to protect the security and privacy of users is PrivateStorage [Aut] by Least Authority [lea]. Much like MEGA and Nextcloud, they claim to provide end-to-end encryption. However, they also implement unique features like accountless authorization, which they implement with a bespoke variation of Privacy Pass [Dav18]. This mechanism allows users to access the service without the need for a traditional account, decoupling service usage from identifiable information (e.g. payment information), and thus enhancing user privacy. This should ensure protection against surveillance, invasive data analysis and profiling, even if the adversary is a nation-state actor. PrivateStorage’s model offers a promising solution that could set new standards for the industry. However, new designs and the new cryptographic and privacy related protocols always raise concerns about potential vulnerabilities. This thesis seeks to analyze the protocol in order to find possible issues or, if none are found, to prove (a selection of) the claims given by PrivateStorage. References: [Aut] Least Authority. Privatestorage. external page https://private.storage/ call_made . Accessed on 2024-02-11. [Aut21] Least Authority. Zkaps whitepaper. 2021. [BHP23] Matilda Backendal, Miro Haller, and Kenneth G. Paterson. Mega: Malleable encryption goes awry. In 2023 IEEE Symposium on Security and Privacy (SP), pages 146–163, 2023. [CPAB23] Daniele Coppola, Kenneth G. Paterson, Martin Albrecht, and Matilda Backendal. Breaking cryptography in the wild: Nextcloud. 2023. [Dav18] Alexander Davidson. Privacy pass: Bypassing internet challenges anonymously. Proceedings on Privacy Enhancing Technologies, 2018(3):164–180, 2018. [lea] Least authority, privacy matters. external page https://leastauthority.com/ call_made . Accessed on 2024-02-11

Completed Projects

Yuanming Song. Refined Techniques for Compression Side-Channel Attacks [ Download pdf (PDF, 910 KB) vertical_align_bottom ] . Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Lenka Mareková.

Jonas Hofmann. Breaking Cryptography in the Wild: Cloud Storage . Supervisor: Prof. Kenny Paterson, Co-supervisor: Kien Tuong Truong.

Noah Schmid. Breaking Cryptography in the Wild: Rocket.Chat.  Supervisor: Prof. Kenny Paterson, Co-supervisor: Jan Gilcher.

Aurel Feer. Privacy Preserving String Search using Homomorphic Encryption [ Download pdf (PDF, 1.1 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Zichen Gui.

Léa Micheloud. Securing Cloud Storage with OpenPGP: An Analysis of Proton Drive [ Download pdf (PDF, 2.1 MB) vertical_align_bottom ] . Supervisor: Prof. Kenny Paterson, Co-supervisors: Matilda Backendal, Daniel Huigens (Proton AG, Zurich).

Daniel Pöllmann.   Differential Obliviousness and its Limitations . Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Tianxin Tang.

Andreas Tsouloupas.   Breaking Cryptography in the Wild: Double-Ratchet Mutations [ Download pdf (PDF, 966 KB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Matteo Scarlata, Kien Tuong Truong.

Thore Göbel.   Security Analysis of Proton Key Transparency  [ Download pdf (PDF, 1 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Daniel Huigens (Proton AG, Zurich), Felix Linker.

Sina Schaeffler.  Algorithms for Quaternion Algebras in SQIsign [ Download pdf (PDF, 664 KB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Luca De Feo (IBM Research, Zurich).

Lucas Dodgson.  Post-Quantum building blocks for secure computation - the Legendre OPRF [ Download pdf (PDF, 862 KB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisors: Dr. Julia Hesse, Sebastian Faller (IBM Research, Zurich).

Mirco Stäuble.  Mitigating Impersonation Attacks on Single Sign-On with Secure Hardware [ Download pdf (PDF, 2.1 MB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisors: Dr. Julia Hesse, Sebastian Faller (IBM Research, Zurich).

Younis Khalil. Implementing a Forward-Secure Cloud Storage System [ Download pdf (PDF, 5.6 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Dr. Felix Günther, Matilda Backendal.

Andrei Herasimau. Formal Verification of the "Crypto Refresh" Update to the OpenPGP Standard [ Download pdf (PDF, 695 KB) vertical_align_bottom ] . Supervisor: Prof. Kenny Paterson, Co-supervisor: Daniel Huigens (Proton Mail).

Benjamin Fischer. Privacy-Preserving Federated Learning for Cyber Threat Intelligence Sharing [ Download pdf (PDF, 3.3 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Juan R. Troncoso-​Pastoriza (Tune Insight SA).

Pascal Schärli.  Security Assessment of the Sharekey Collaboration App [ Download pdf (PDF, 2.9 MB) vertical_align_bottom ] . Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Bernhard Tellenbach (Armasuisse).

Lena Csomor. Bridging the Gap between Privacy Incidents and PETs [ Download pdf (PDF, 1.3 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Dr. Anwar Hithnawi, Alexander Viand, Shannon Veitch.

Ran Liao. Linear-​Time Zero-​Knowledge Arguments in Practice . Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Jonathan Bootle (IBM Research, Zurich). Christian Knabenhans.   Practical Integrity Protection for Private Computations [ Download pdf (PDF, 873 KB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Dr. Anwar Hithnawi, Alexander Viand.

Ella Kummer.  Counting filters in adversarial settings [ Download pdf (PDF, 943 KB) vertical_align_bottom ] . Supervisor. Prof. Kenny Paterson, Co-supervisors: Dr. Anupama Unnikrishnan, Mia Filić.

Massimiliano Taverna.  Breaking Cryptography in the Wild: Web3 [ Download pdf (PDF, 1.4 MB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson.

Giacomo Fenzi.  Klondike: Finding Gold in SIKE [ Download pdf (PDF, 7.6 MB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Fernando Virdia.

Kien Tuong Truong.  Breaking Cryptography in the Wild: Threema  [ Download pdf (PDF, 824 KB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisor: Matteo Scarlata.

Jonas Meier.  Diophantine Satisfiability Arguments for Private Blockchains [ Download pdf (PDF, 2.1 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Patrick Towa.

Marc Ilunga.  Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol [ Download pdf (PDF, 1.2 MB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Felix Günther.

Robertas Maleckas.  Cryptography in the Wild: Analyzing Jitsi Meet [ Download pdf (PDF, 996 KB) vertical_align_bottom ] .  Supervisor: Prof. Kenny Paterson, Co-supervisor: Prof. Martin Albrecht.

Miro Haller. Cloud Storage Systems: From Bad Practice to Practical Attacks  [ Download pdf vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Matilda Backendal.

Lorenzo Laneve . Quantum Random Walks [ Download pdf vertical_align_bottom ]. Joint supervisor: Prof. Kenny Paterson.

Florian Moser . Swiss Internet Voting [ Download pdf vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson.

Moritz Winger . Automated Hybrid Parameter Selection & Circuit Analysis for FHE [ Download pdf vertical_align_bottom ]. Joint supervisor: Prof. Kenny Paterson, Co-supervisor: Alexander Viand.

Tijana Klimovic . Modular Design of the Messaging Layer Security (MLS) Protocol [ Download pdf (PDF, 1.3 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Igors Stepanovs.

Radwa Abdelbar . Post-Quantum KEM-based TLS with Pre-Shared Keys [ Download pdf (PDF, 972 KB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Dr. Felix Günther, Dr. Patrick Towa.

Raphael Eikenberg . Breaking Bridgefy, Again [ Download pdf vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Prof. Martin Albrecht.

Andreas Pfefferle . Security Analysis of the Swiss Post’s E-Voting Implementation . Supervisor: Prof. Kenny Paterson.

Mihael Liskij . Survey of TLS 1.3 0-RTT Usage [ Download pdf (PDF, 803 KB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Felix Günther.

Nicolas Klose . Characterizing Notions for Secure Cryptographic Channels [ Download pdf (PDF, 1.4 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Felix Günther.

Alexandre Poirrier . Continuous Authentication in Secure Messaging [ Download pdf vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisors: Dr. Benjamin Dowling, Dr. Felix Günther.

Luca Di Bartolomeo . ArmWrestling: efficient binary rewriting for ARM [ Download pdf (PDF, 661 KB) vertical_align_bottom ]. Joint Supervisor: Prof. Kenny Paterson.

Matteo Scarlata . Post-Compromise Security and TLS 1.3 Session Resumption [ Download pdf (PDF, 1.5 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Benjamin Dowling.

Anselme Goetschmann . Design and Analysis of Graph Encryption Schemes [ Download pdf (PDF, 2.9 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson, Co-supervisor: Dr. Sikhar Patranabis.

Lara Bruseghini . Analysis of the OpenPGP Specifications and Usage . Joint Supervisor: Prof. Kenny Paterson.

Semira Einsele . Average Case Error Estimates of the Strong Lucas Probable Prime Test [ Download pdf (PDF, 893 KB) vertical_align_bottom ]. Joint Supervisor: Prof. Kenny Paterson.

Jan Gilcher . Constant-Time Implementation of NTS-KEM [ Download pdf (PDF, 3.2 MB) vertical_align_bottom ]. Supervisor: Prof. Kenny Paterson. 

Theses and papers

Theses and papers: sample material.

Below you can find a number of recent PhD theses, Master's theses and papers, on each of the five core themes included in the Master of Cybersecurity. These are merely provided as examples.

  • Cryptography
  • Hardware Security
  • Secure Software
  • Secure Systems

2022-2023 seminars & theses

Curious about the research seminars and the master thesis topics?

Read more   

1 - Cryptography: samples of publications

  • W. Beullens, The Design and Cryptanalysis of Post-Quantum Digital Signature Algorithms , PhD  thesis, KU Leuven, 2021
  • C. Bootland, Efficiency and security aspects of lattice-based cryptography , PhD thesis, KU Leuven, 2021
  • C. Li, New Methods for Symmetric Cryptography , PhD thesis, KU Leuven, 2020
  • R. Zhang, Analyzing and Improving Proof-of-Work Consensus Protocols , PhD thesis, KU Leuven, 2019

MASTER'S THESES

  • R. Geelen, Bootstrapping Algorithms for BGV and FV , 2021
  • J. Vandersmissen, A White-Box Speck Implementation using Self-Equivalence Encodings , 2021
  • E. Karagiannakou, Best of Both Worlds: Prime Field PGV Constructions , 2020
  • T. Beyne, Linear Cryptanalysis in the Weak Key Model , 2019

Y. Chen, E. Lambooij, and B. Mennink, How to Build Pseudorandom Functions From Public Random Permutations , In Advances in Cryptology – CRYPTO 2019, Lecture Notes in Computer Science, Springer-Verlag, 27 pages, 2019

T. Beyne, Linear Cryptanalysis of FF3-1 and FEA , In Advances in Cryptology - CRYPTO 2021, Lecture Notes in Computer Science, Springer-Verlag, pp. 41-69, 2021

W. Beullens, T. Kleinjung, and F. Vercauteren, CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations , In Advances in Cryptology – ASIACRYPT 2019, Lecture Notes in Computer Science, Springer-Verlag, 20 pages, 2019

Y. Lindell, B. Pinkas, N. Smart, and A. Yanai, Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ , Journal of Cryptology 32(3), 1026?1069 pages, 2019

2 - Privacy: samples of publications

  • E. Makri, Secure and Efficient Computing on Private Data , PhD thesis, KU Leuven, 2021
  • M. Juarez, Design and Evaluation of Website Fingerprinting Techniques , PhD thesis, KU Leuven, 2019
  • E. Balsa, Chaff-based profile obfuscation , PhD thesis, KU Leuven, 2019
  • K. Stefanidis - Vozikis, A Distributed Performance Measurement Tool for Tor Browser , 2021
  • B. Van der Vliet,  Improving resistance against poisoning attacks in a federated malware classifier , 2021
  • D. De Troch, dPACE, a decentralized Privacy-preserving, yet Accountable Car sharing Environment , 2020
  • A. Madhusudan, Applying Smart Contracts to Secure Car Sharing Systems , 2018

Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom Van Goethem, The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion , Proceedings on Privacy Enhancing Technologies, De Gruyter, July 12, 2021

R. Galvez, V. Moonsamy, C. Diaz, Less is More: A privacy-respecting Android malware classifier using Federated Learning , Proceedings on Privacy Enhancing Technologies 2021(4), 20 pages, 2021

S. Siby, M. Juarez, C. Diaz, C. Troncoso, and N. Vallina-Rodriguez, Encrypted DNS --> Privacy? A Traffic Analysis Perspective , In Network and Distributed System Security Symposium (NDSS 2020), Internet Society, 18 pages, 2020.

I. Symeonidis, G. Biczok, F. Shirazi, C. Pérez-Solà, J. Schroers, and B. Preneel, Collateral damage of Facebook third-party applications: a comprehensive study , Computers & Security 77: 179-208 (2018)

3 - Hardware security: samples of publications

  • J. P. D'Anvers, Design and Security Analysis of Lattice-based Post-Quantum Encryption , PhD thesis, KU Leuven, 2021
  • L. De Meyer, Cryptography in the Presence of Physical Attacks: Design, Implementation and Analysis , PhD thesis, KU Leuven, 2020
  • K. Chuang, Highly Reliable Physically Unclonable Functions: Design, characterization and security analysis , PhD thesis, KU Leuven, 2020
  • P. Maene, Lightweight Roots of Trust for Modern Systems-on-Chip , PhD thesis, KU Leuven, 2019
  • S. D'haeseleer, Hardware design for cryptanalysis , 2019
  • M. Van Beirendonck, Hardware Countermeasures Against Passive and Active Implementation Attacks , 2019
  • A. Purnal, Protecting Keccak against combined side-channel and fault attacks , 2018
  • A. Peetermans, Attacking and Securing Hardware Random Number Generators , 2018

L. Wouters, E. Marin, T. Ashur, B. Gierlichs, and B. Preneel, Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars , IACR Transactions on Cryptographic Hardware and Embedded Systems 2019(3), pp. 66-85, 2019.

F. Turan, and I. Verbauwhede, Compact and Flexible FPGA Implementation of Ed25519 and X25519 , ACM Transactions on Embedded Computing Systems 18(3), 21 pages, 2019.

V. Arribas, B. Bilgin, S. Nikova, G. Petrides, and V. Rijmen, Rhythmic Keccak: SCA Security and Low Latency in HW , IACR Transactions on Cryptographic Hardware and Embedded Systems 2018(1), 22 pages, 2018

4 - Secure software: samples of publications

Laurens Sion,  Automated Threat Analysis for Security and Privacy , PhD, KU Leuven, 2020

  • Andreas Nuyts,  Contributions to Multimode and Presheaf Type Theory , PhD, KU Leuven, 2020
  • Emad Heydari Beni, 2021, Deployment Efficiency and Data Security for the Cloud, Doctor of Engineering Science, PhD, KU Leuven, 2021
  • Emma Lavens,  Comparative study of the vulnerability scanner landscape , Master's Thesis, 2021
  • Vicky Vanluyten,  Measuring de-identification: applicability of de-identification methods and quantification of their performance , Master's Thesis, 2021
  • Kristof Achten,  Formally verifying data race freedom of FreeRTOS based applications using VeriFast , Master's Thesis, 2019
  • Jasper Hawinkel,  Verification of the FreeRTOS scheduler with VeriFast , Master's Thesis, 2017
  • Laurens Sion, Dimitri Van Landuyt, koen Yskout, stef Verreydt, wouter Joosen, Automated Threat Analysis and Management in a Continuous Integration Pipeline , IEEE Secure Development Conference (SecDev 2021), 2021 IEEE Secure Development (SecDev) 
  • Tobias Reinhard, Bart Jacobs, Ghost Signals: Verifying Termination of Busy Waiting , International Conference on Computer-Aided Verification, Lecture Notes in Computer Science, Springer Verlag, April 17, 2021
  • Stylianos Tsampas, Frank Piessens, Dominique Devriese, Christian Williams, A Categorical Approach to Secure Compilation , (eds. Daniela Petrisan, Jurriaan Rot), 15th IFIP WG 1.3 International Workshop, CMCS 2020, International Workshop on Coalgebraic Methods in Computer Science, volume 12094, pages 155-179, Springer, Cham, 2020
  • Koen Yskout, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts, Wouter Joosen, Threat modeling: from infancy to maturity , (eds. Gregg Rothermel, Doo-Hwan Bae), International Conference on Software Engineering, International Conference on Software Engineering - New Ideas and Emerging Results (ICSE-NIER'20), pages 9-12, Seoul, South Korea, May 23-29, 2020

5 - Systems security: samples of publications

  • Jo Van Bulck,  Microarchitectural Side-Channel Attacks for Privileged Software Adversaries , PhD, KU Leuven, 2020
  • Jan Spooren,  DNS Abuse and Active Authentication: Applications of Machine Learning in Cyber Security , PhD, KU Leuven, 2020
  • Thomas Vissers,  Large-scale Analysis of Attack Techniques on Internet Domain Names , PhD, KU Leuven, 2018
  • Job Noorman,  Sancus: A Low-Cost Security Architecture for Distributed IoT Applications on a Shared Infrastructure , PhD, KU Leuven, 2017
  • Pieter-Jan Vrielynck,  A practical and scalable system for Decentralized Access Control , Master's Thesis, 2021
  • Vik Vanderlinden,  Exploiting Timing Side-Channel Leaks in Web Applications that Tell on Themselves , Master's Thesis, 2021
  • J. Hoes, Rise of the Machines - On the Security of Cellular IoT Devices , 2021
  • Martijn Sauwens,  Consensus met Smart Contracts in Gedecentraliseerde Webapplicaties , Master's Thesis, 2020
  • Marton Bognar,  Analyzing side-channel leakage in secure DMA solutions , Master's Thesis, 2020
  • Stien Vanderhallen,  Robust Authentication for Automotive Control Networks through Covert Bandwidth , Master's Thesis, 2020
  • Hans Winderix,  Security Enhanced LLVM , Master's Thesis, 2018

Fritz Alder, Jo Van Bulck, David Oswald, Frank Piessens, Faulty Point Unit: ABI Poisoning Attacks on Intel SGX , Annual Computer Security Applications Conference (ACSAC), Annual Computer Security Applications Conference, 13 pages, Austin, USA, December 7-11, 2020

Gertjan Franken, Tom Van Goethem, Wouter Joosen, Reading between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems , 2021 IEEE Symposium on Security and Privacy (SP), 2021 IEEE Symposium on Security and Privacy, pages 247-264, San Francisco, CA, US, May 23-27, 2021

Hans Winderix, Jan Tobias Mühlberg, frank Piessens, Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks , IEEE European Symposium on Security and Privacy, 2021 IEEE European Symposium on Security and Privacy (EuroS&P)

Mathy Vanhoef, Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation , USENIX Security Symposium, Proceedings of the 30th USENIX Security Symposium

PHD PRIME

Cryptography Thesis Topics

A simple definition of cryptography is the study of designing, developing, and testing secure communication techniques . These techniques are used to protect the transmission data from the sender point to the receiver point. Moreover, cryptography is a significant area of cybersecurity. Also, it is the study of complications of data patterns over images using merging/microdots . Overall, it is recognized several real-time applications from different research fields. From this article, you can collect more interesting and latest cryptography thesis topics with other related research details!!!  

            Now, we can see significant terms that are largely used in cryptography studies. It is not just a word, instead, it signifies the key functions involved in cryptography . Our resource team has years of experience in handling cryptography projects. So, we know all essential things to guide you properly from the beginning of the project as area identification till the end of the project as thesis submission . You can surely find us as one-stop solutions to acquire all sorts of reliable research services in the cryptography field.   

Choosing Best Cryptography Thesis Topics

Important Terminologies of Cryptography 

  • It is an exploration of code-cracking
  • It is made up of two main parts such as cryptoanalysis and cryptography
  • It is a secret value utilized for data encryption and decryption
  • It is an algorithm to encode the data which is human unreadable form  

What is the principle of Cryptography?

In point of fact, cryptography mainly works on the principle of code writing and solving to achieve security and privacy over information . For more clarity, it is a process of making information into secret code to protect original content. Even if the third parties attempt to get original data without the knowledge of the actual sender and receiver, it will display only secret code, not the original data.

Over the past few years of cryptography developments, cybersecurity has had a key player role in both current and future cryptography research directions. Since, cybersecurity is widely followed in various big community projects like a corporation, industries, personal, government, etc.

For instance, it can deal with large-scale different types of data. For this type of data-intensive application/system, cryptography algorithms are very significant specifically in real-world scenarios. Enhance your knowledge of your selected research area to acquire more cryptography thesis topics.

For illustration purposes, now we can see symmetric and asymmetric key systems. Majorly, the symmetric key is used in the case of a public-key infrastructure. As well, it uses a private key for both encryption and decryption processes. On contrary, asymmetric keys use both public and private keys for both encryption and decryption processes . As well, the techniques of the symmetric and asymmetric key system largely involve mathematical operations. Here, we have a list of key techniques of symmetric cryptography and asymmetric cryptography .   

What are cryptography algorithms? 

Symmetric Cryptography Algorithms 

  • Advanced Encryption Standard (AES)
  • International Data Encryption Algorithm (IDEA)
  • Needham-Schroder
  • Triple-Digit Encryption Standard (3DES)
  • Digital Encryption Standard (DES)

Asymmetric Cryptography Algorithms 

  • Diffie-Hellman
  • Elliptical Wave Theory
  • HCC, ECC, etc.

Next, we can see the general procedure to develop a cryptography project . As we know already, cryptography basically involves encryption and decryption processes. Here, we mentioned to you how the encryption and decryption processes take place for establishing basic communication security.

Several encryptions and decryption algorithms are existing in cryptography. One should intelligently need to select the algorithm based on project requirements. To know the efficient algorithms, perform a comparative study on short-listed algorithms.    

How does a cryptography algorithm work? 

  • Sender convert input plain data (readable) into cipher data (unreadable) using an encryption algorithm and transfer to the receiver
  • Receiver converts received cipher data (unreadable) into plain data (readable) using a decryption algorithm

As mentioned earlier, cryptography is of two types as symmetric and asymmetric cryptography . Although cryptography collectively has benefited from these different types, it has some constraints in system implementation. Particularly, asymmetric cryptography is very slower (nearly 3 times) than symmetric cryptography. Since it happens due to multi-keys and multi-parties used in the cryptographic technique . Here, we have given you some other important constraints in cryptography algorithms.  

Limitations of Cryptography Algorithms 

  • Expensive Technology
  • High Computation Overheads
  • High Battery Utilization

Now, we can see possible cryptography attacks that are intended to disturb the performance of cryptographic techniques . Here, we have given you traditional top 3 attacks in cryptography with their intentions. Our developers are skillful to design suitable security mechanisms to control these attacks .

Since, we have successfully handled several complex cryptography attacks. So, we know how to identify suitable solutions for every cryptography attack . If you are curious to know solutions for the below conventional attacks, then we let you know the appropriate solving techniques and algorithms.

Cryptography Attacks Examples 

  • Here, an attacker can select plain text and view ciphertext in order to guess the used encryption algorithm
  • Based on plain text and corresponding ciphertext, the attacker can reverse the encryption process by the reverse-engineering method
  • Here, an attacker can acquire only ciphertext
  • If the attacker has the strong groundwork in statistical methods, then it easy to change cipher text into plain text
  • Here, an attacker can acquire some piece of plain text information like character-pairings
  • Based on that info, the attacker can crack the ciphertext and view plain text

Further, we have also given you some growing cryptography attacks. Similar to technologies, attackers also strengthen and improve the attacks . So, it is required to develop advanced solutions for these types of cryptography attacks.  As a matter of fact, our developers have a strong technical foundation in both conventional and next-generation techniques . Therefore, we are capable to cope with any sort of cryptography attack regardless of complexity. As a result, you can identify the best cryptography thesis topics in your desired research areas.  By the by, we also have solutions for these below listed developing attacks. We assure you that our solutions are efficient in default than other existing techniques.

Emerging Cryptography Attacks 

  • Phishing Attacks
  • Malware Attacks
  • Distributed Denial of Service (DDoS)
  • Rogue Software
  • Password-guessing Attacks
  • Man-in-the-Middle / Eavesdropping  

How to mitigate DDoS attacks using Cryptography? 

DDOS Attack

Distributed denial of service attack is one of the popular cyberattacks in recent times. The main intention of this attack is to deny the resource/service accessibility to legitimate users . In general communication, the server sends the encrypted file to the client and the client decrypts the encrypted file to read original content. Overall, both server and client reliable communication should be fault-tolerant even in DDoS attacks . Further, DDoS attacks are classified into two forms as crash attacks and flooding attacks.  

Two Types of DDOS Attacks 

  • Make server to get crash / corrupted with the help of bugs
  • Consequently, the server stops providing services to clients/users
  • In this, it sends huge numbers of resource requests to the server. So that, the server will become too busy or stop functioning
  • Mainly, it uses automated programs to send continuous requests to the server

Preventive Measures of DDOS Attacks 

  • One Time Password
  • Secure Encryption Methods
  • Long and Strong Passwords

In addition, we have also given you other preferred techniques to prevent DDoS attacks in real-world scenarios. Likewise, we suggest fitting preventive measures for other cryptography attacks too. We have more than enough practice in handling different cryptography techniques in all types of cryptography such as quantum, lightweight, cryptosystem, digital signature, watermarking, hashing, steganography, etc. To the great extent, we also design and develop hybrid techniques to solve complicated issues.  Other Security Approaches for preventing the DDoS attack is followed, 

  • Developer-friendly to implement
  • Minimum Overhead
  • High Battery Lifespan
  • Cost-effective

How do you choose a thesis topic?

So far, we have fully discussed cryptography fundamentals and budding developments. Now, we can see the essential things to be considered for selecting a thesis topic for your cryptography research . Make sure that your handpicked thesis topic motivates you to do a study on particular research problems.

Research is a long process that ranges from research planning to thesis defense . Therefore, choose your desired topic which motivates you throughout your research journey till publishing your research work in top demanding (example cryptography journals list ).  

What are the best topics for a thesis?

We have an unlimited number of cryptography thesis topics for exploring all sorts of research areas. If you have puzzling questions in your mind to identify the best thesis topics , then we help you to find answers to all your puzzling questions.  Further, we also help you to choose the optimal one from your short-listed thesis topics. Before finalizing a topic, check whether the topic is inspiring and not too vague.   

What makes a good thesis topic?

To achieve a good thesis topic, check whether handpicked thesis topic is clear to understand a single meaning with high accuracy . If your topic is too short then it will not be clear. So, give sufficient information on the thesis topic in a broad way. Also, it will be helpful in preparing a thesis statement for your thesis. Overall, a good thesis topic exactly points out your research work to readers . Further, it also explicitly signifies that what readers can expect from this proposed research work.

Moreover, we have also given you different stages to reach the best cryptography thesis topics. These stages help you to gain knowledge on recent research, analyze the scope of research ideas and assess supportive resource materials. Further, we also guide you to choose the best topic for your cryptography research . Let’s have a glance over the three main stages of good thesis topic selection in detail.    

How do we find a good thesis topic?

  • Come with your desired and innovative research ideas
  • Make a note of your collected research ideas
  • Analyze the collected research ideas
  • Do a comparative study to choose the optimal one
  • Make sure that you have an interest in a selected topic
  • Check the sufficiency of research materials on a selected topic
  • Check both online and offline resources
  • Once again verify the accessibility of all basic requirements of research
  • Make final decision to confirm the topic

To the end, we can see the list of important cryptography thesis topics from multiple research perceptions . To provide you with good thesis topics, we undergo a review of several cryptography research papers. Further, we analyze current research materials to collect all possible research ideas.

Our ultimate goal is to give you unique cryptography related project topics with a high future scope factor particularly in your requested research areas of cryptography. Further, if you are interested in more innovative topics then approach our team.  

Popular Cryptography Thesis Topics

  • Key Management and Distribution
  • Secure Biometric-based Authentication
  • Advance Blockchain System Modelling
  • Network Vulnerabilities Prediction and Analysis
  • Security and Privacy Challenges in Blockchain
  • IoT System Security using Blockchain Context
  • Network Intrusion Detection and Prevention
  • Cloud Computing using Quantum Cryptography
  • Attacks of Blockchain over Conventional Systems
  • Security over System Architecture and Network Services
  • Insider Threat Detection with Defensive Measures
  • Secure Web Services Management by Privacy Policies
  • Privacy Preservation Techniques in Ubiquitous Computing
  • Digital Forensic Data Investigation using Blockchain
  • Protected Grid Computing and Distributed Computing
  • Trust Management and Evaluation using Trust Parameters
  • Authentication, Authorization, and Accountability (AAA) in Blockchain
  • Prototyping for Trust, Authentication, Authorization, and Trust Models
  • New Consensus Algorithms Development in Blockchain Security
  • Vehicular and Mobile Ad Hoc Network (VANET / MANET) Security
  • Efficient Access Control Mechanisms for Information Security
  • Secure Information Hiding and Watermarking Applications

Overall, we like to hold your hands with us to make your research work unique from other usual works . We guarantee you that our topics are extremely innovative to create a new dimension of cryptography research .

Consequently, it creates a unique contribution in your desired research area of cryptography for social developments . Once you connect with us, we provide you with in-depth research, cryptography thesis topics, PhD Research Implementation , and thesis writing services to reach your research ambitions. We assure you that all our services are trustable, unique, and accurate in every cryptography research aspect.

cryptography dissertation topics

Opening Hours

  • Mon-Sat 09.00 am – 6.30 pm
  • Lunch Time 12.30 pm – 01.30 pm
  • Break Time 04.00 pm – 04.30 pm
  • 18 years service excellence
  • 40+ country reach
  • 36+ university mou
  • 194+ college mou
  • 6000+ happy customers
  • 100+ employees
  • 240+ writers
  • 60+ developers
  • 45+ researchers
  • 540+ Journal tieup

Payment Options

money gram

Our Clients

cryptography dissertation topics

Social Links

cryptography dissertation topics

  • Terms of Use

cryptography dissertation topics

Opening Time

cryptography dissertation topics

Closing Time

  • We follow Indian time zone

award1

  • Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

100 Cryptography Essay Topic Ideas & Examples

Inside This Article

Cryptography is a fascinating field that encompasses the study of secure communication techniques, encryption algorithms, and data protection methods. It plays a crucial role in today's digital world, ensuring the confidentiality, integrity, and authenticity of information. If you're studying cryptography or simply have an interest in the subject, here are 100 essay topic ideas and examples to explore:

  • The history of cryptography: From ancient times to modern-day encryption methods.
  • The role of cryptography in national security and intelligence agencies.
  • The ethical implications of encryption: Balancing privacy and security.
  • Cryptography in warfare: How it has been used in military operations throughout history.
  • The importance of cryptography in financial transactions and online banking.
  • Quantum cryptography: The future of secure communication.
  • The impact of cryptography on digital currencies like Bitcoin.
  • Cryptography and the protection of personal data in the age of surveillance.
  • The role of cryptography in securing cloud computing environments.
  • Cryptanalysis: The art of breaking codes and encryption systems.
  • The use of cryptography in protecting intellectual property rights.
  • Cryptography and the prevention of cybercrime.
  • The legal and ethical challenges of government surveillance in the context of cryptography.
  • Cryptography and the protection of critical infrastructure systems.
  • The role of cryptography in securing e-commerce transactions.
  • Encryption algorithms: A comparative analysis of their strengths and weaknesses.
  • Cryptography and the challenges of securing IoT (Internet of Things) devices.
  • The impact of cryptography on digital forensics and cyber investigations.
  • The mathematical principles behind cryptography: Exploring number theory and algorithms.
  • The role of cryptography in securing communication networks.
  • Cryptography in healthcare: Protecting patient data and medical records.
  • The use of cryptography in securing voting systems and elections.
  • Cryptography and the protection of sensitive government communications.
  • The challenges of implementing cryptography in developing countries.
  • The impact of cryptography on the military's command and control systems.
  • Cryptography and the protection of intellectual property in the entertainment industry.
  • The future of post-quantum cryptography: Developing encryption resistant to quantum computers.
  • The role of cryptography in securing social media platforms.
  • Cryptography and the protection of personal privacy in the digital age.
  • The influence of cryptography on international diplomacy and communication.
  • The challenges of implementing cryptography in resource-constrained environments.
  • Cryptography and the development of secure messaging applications.
  • The impact of cryptography on the evolution of cyber warfare.
  • Cryptography and the protection of classified information.
  • The role of cryptography in securing online gaming and virtual economies.
  • The challenges of balancing encryption and lawful access to information.
  • Cryptography and the protection of intellectual property in the pharmaceutical industry.
  • The influence of cryptography on the evolution of online privacy laws.
  • The role of cryptography in securing smart cities and urban infrastructure.
  • The impact of cryptography on the development of blockchain technology.
  • Cryptography and the protection of trade secrets in the corporate world.
  • The challenges of implementing cryptography in autonomous vehicles and transportation systems.
  • Cryptography and the protection of personal health data in wearable devices.
  • The role of cryptography in securing the Internet of Medical Things (IoMT).
  • The impact of cryptography on securing online education platforms and e-learning.
  • Cryptography and the protection of personal identity in digital identity management systems.
  • The challenges of implementing cryptography in resource-constrained IoT devices.
  • Cryptography and the protection of sensitive information in the legal profession.
  • The role of cryptography in securing supply chains and logistics networks.
  • The impact of cryptography on securing personal communication devices like smartphones.
  • Cryptography and the protection of sensitive information in the energy sector.
  • The challenges of implementing cryptography in social welfare and benefit systems.
  • Cryptography and the protection of personal data in the hospitality industry.
  • The role of cryptography in securing intellectual property in the gaming industry.
  • The impact of cryptography on securing online streaming platforms and digital content distribution.
  • Cryptography and the protection of personal data in the transportation sector.
  • The challenges of implementing cryptography in emergency response systems.
  • Cryptography and the protection of personal data in the insurance industry.
  • The role of cryptography in securing online marketplaces and e-commerce platforms.
  • The impact of cryptography on securing personal data in the tourism industry.
  • Cryptography and the protection of sensitive information in the aerospace industry.
  • The challenges of implementing cryptography in public transportation systems.
  • Cryptography and the protection of personal health data in telemedicine.
  • The role of cryptography in securing online dating platforms and applications.
  • The impact of cryptography on securing personal data in the beauty and wellness industry.
  • Cryptography and the protection of sensitive information in the agricultural sector.
  • The challenges of implementing cryptography in smart home systems.
  • Cryptography and the protection of personal data in the fashion and retail industry.
  • The role of cryptography in securing online food delivery platforms.
  • The impact of cryptography on securing personal data in the music industry.
  • Cryptography and the protection of sensitive information in the automotive industry.
  • The challenges of implementing cryptography in smart grid systems.
  • Cryptography and the protection of personal health data in fitness tracking devices.
  • The role of cryptography in securing online job platforms and recruitment websites.
  • The impact of cryptography on securing personal data in the art and culture industry.
  • Cryptography and the protection of sensitive information in the telecommunications sector.
  • The challenges of implementing cryptography in smart city transportation systems.
  • Cryptography and the protection of personal data in the real estate industry.
  • The role of cryptography in securing online music streaming platforms.
  • The impact of cryptography on securing personal data in the gaming industry.
  • Cryptography and the protection of sensitive information in the banking sector.
  • The challenges of implementing cryptography in smart irrigation systems.
  • Cryptography and the protection of personal health data in remote patient monitoring.
  • The role of cryptography in securing online travel booking platforms.
  • The impact of cryptography on securing personal data in the film and entertainment industry.
  • Cryptography and the protection of sensitive information in the insurance sector.
  • The challenges of implementing cryptography in smart parking systems.
  • Cryptography and the protection of personal data in the education industry.
  • The role of cryptography in securing online sports streaming platforms.
  • The impact of cryptography on securing personal data in the healthcare industry.
  • Cryptography and the protection of sensitive information in the retail sector.
  • The challenges of implementing cryptography in smart waste management systems.
  • Cryptography and the protection of personal health data in digital therapeutics.
  • The role of cryptography in securing online ticketing platforms.
  • The impact of cryptography on securing personal data in the fashion industry.
  • Cryptography and the protection of sensitive information in the hospitality sector.
  • The challenges of implementing cryptography in smart building management systems.
  • Cryptography and the protection of personal data in the e-learning industry.
  • The role of cryptography in securing online dating platforms.
  • The impact of cryptography on securing personal data in the food and beverage industry.

These essay topics cover a wide range of industries and sectors where cryptography plays a vital role in protecting sensitive information. Whether you're interested in the technical aspects of encryption algorithms or the ethical implications of cryptography, these topics provide a starting point for your research and analysis.

Want to research companies faster?

Instantly access industry insights

Let PitchGrade do this for me

Leverage powerful AI research capabilities

We will create your text and designs for you. Sit back and relax while we do the work.

Explore More Content

  • Privacy Policy
  • Terms of Service

© 2024 Pitchgrade

TOP 6 RESEARCH TOPICS IN CRYPTOGRAPHY

Cryptography refers to the methodology which is involved in establishing safe communication and ensuring data privacy. When messages are transformed into unperceivable content using cryptographic tools, they cannot be easily retrieved by attackers.  If you are facing any issues about your projects in cryptography then continue to read this article on research topics in cryptography.

Generating cryptographic keys, surfing over the web, establishing secure communication for instance financial transactions and personal mails, digital key signing, data protection, and verification are some of the major domains in which the algorithms of cryptography are used extensively. 

Here you can get an ultimate overview of cryptography research from the very basics. First, let us understand cryptography

What is cryptography?

  • Cryptography generally denotes the procedure involved in the conversion of usual data into indistinguishable information in a motive to protect it
  • Also the conversion of highly protected imperceptible data into normal text form a part of cryptography
  • Cryptography is of great significance in most of the everyday applications such as online electronic financial transactions and securing passwords etc.
  • Usually three kinds of cryptography methods are used at large

To get detailed descriptions and research-oriented explanations on various Cryptography methods you can reach out to our experts at any time. With a world-class reputation, experts at research topics in cryptography have earned the confidence of students from more than one hundred and fifty countries of the world. 

The crystal clear explanations of the mechanisms and principles behind the working of cryptography have gained us global recognition. If you are looking to get expert assistance for your Cryptography projects then you need to surely check out our website. We will now talk about the working of cryptography

Latest Research Areas in Cryptography

How does cryptography work?

  • Safe communication establishment amid third party interruptions by rivals is the major goal of cryptography
  • Proper algorithms and appropriate keys are deployed for transforming plain text data input to cipher text-based encrypted output
  • Identifying and authenticating participants
  • Critical data encryption
  • Unchangeable record creation involving permanent audit attempts
  • Security of the tools and techniques in cryptography
  • Cryptographic methodological complexities

Hence standard and highly reliable research support is essential to understand in more depth the tools, protocols, and software for establishing successful cryptography research projects . For this purpose, you can readily reach out to our experts who have guided an ample number of highly successful research topics in cryptography . So we are capable of handling any Visual Cryptography project . Let us now look into the principles behind the working of cryptography

What are the principles of cryptography?

The following are the key principles involved in cryptography for ensuring data transmission security demands

  • Since the Identity of both sender and receiver are revealed, one cannot deny any action of transmission that has been performed
  • The proof of both transmission and reception disable is a person from disowning or repudiation
  • A sender can usually authenticate the receiver with his or her particular identity
  • Since the identity of both the parties are validated efficiently, there is no room for missing out on the authentication
  • Cryptography also provides for an approach wherein a receiver can surely authenticate the messages received
  • Hence tampering of messages cannot be entertained
  • Only the authenticated user or receiver can read the data
  • Data can therefore be protected from Eavesdropping attacks

Keys play an important role in ensuring the secrecy and privacy of encrypted data in cryptosystems . Hence make sure that you protect the keys used in your project. All the encryption keys should never be stored in plain text in association with their respective protected data. If you do so, then it is the same as leaving the front door closed with keys on it. We are well known for such easily understandable analogies-based explanations in cryptography. The following methodologies are used commonly for key protection purposes thus ensuring greater security. 

  • Scrypt, bcrypt, and PBKDF2 are the algorithms that are used for both password generation and bootstrapping the cryptosystem
  • It is important to note that the password has to be very strong and known only to a few administrators
  • By doing all these you can ensure that unencrypted keys can be stored in any place
  • You can use Access Control Lists that are strong for protecting keys and storing them in file systems. The least privilege principle has to be followed for more security
  • Coding can be used to establish API calls to the hardware security module
  • As a result proper keys are provided at times of necessity and performing data decryption on the hardware security module becomes easy

Such suitable and proven methods are developed and compiled by our experts to make your cryptography project experience more interesting and informative. Therefore you can get access to authentic and reliable data needed for your projects from our experts. Massive resources and real-time research data on various research topics in Cryptography are available with us. Get in touch with us for a progressive research career. Let us now look into the Cryptography techniques that are commonly used

Techniques in Cryptography

Cryptography is one of the fastest-growing fields of research. The following are the important areas and methods in Cryptography

  • Privacy-enhancing and post-quantum cryptography methods
  • Message authentication codes and Lightweight cryptography
  • Lattice-based Cryptography and Multi-party threshold cryptography
  • Asymmetric and symmetric encryption based cryptanalysis 
  • Public key and quantum cryptography
  • Identity and attributes based encryption methods
  • Elliptic curve and pairing-based cryptography techniques

For an explanation regarding these Cryptography techniques and approaches , you shall feel free to contact us. Customized research support and on-time project delivery are our trademarks. The following are the commonly researched cryptography topics

  • Anonymous aggregation and signature
  • Homomorphic construct with signature
  • Homomorphic Encryption
  • Aggregate signature

The above fields are themselves quite large areas of research that can be significantly developed to include many other aspects of cryptography . Appropriate and crisp explanations and definitions regarding the keys and cryptographic protocols can be obtained from our website. In this respect let us discuss the important keys and their features in Cryptography

  • Secret key (stream cipher and block cipher)    
  • Hash Function (secure hash algorithm)
  • Diffie – Hellman – discrete algorithm
  • Ring – LWE – lattice-based
  • ECDH ECMOV – elliptic curve
  • ElGamal Encryption (discrete logarithm)
  • Niederreiter McEliece (code-based mathematical hard problem)
  • Elliptic Curve Encryption 
  • NTRUEncrypt (lattice-based)
  • RSA Robin (integer factorization)
  • ECDSA (elliptic curve)
  • NTRUSign (lattice-based)
  • RSA Digital Signature (factorization of integers)
  • McEliece (code-based)
  • ElGamal Signature (discrete logarithm based)

About these keys and their respective algorithms, you can reach out to our experts who have gained enough experience in handling all the advanced cryptography methods and approaches. As a result, we can provide you with well advanced, enhanced, and high-quality research guidance in all research topics in Cryptography. We will now give you a quick note on approaching any Cryptography projects in today’s world

How to do a research project in Cryptography?

  • Provide an overview with an ultimate picture of all the technologies being handled in your study
  • Discussions on appropriate technologies and their related applications
  • Quote the issues and problems in the field of your study
  • Discussion of research issues in the present literature
  • Addressing the sensitive views and issues
  • Mention the unaddressed but important issues
  • Summary on the future scope of research based on gaps identified

Technically skilled world-class certified engineers and developers in Cryptography are with us who can support you in all aspects of your research. The writers and content makers with us gained expertise in their respective fields due to their two decades of vast knowledge and experience in Cryptography research. So we ensure to provide you with ultimate guidance for your Cryptography research. What are the recent topics for research in cryptography?

Research Areas in Cryptography

  • Managing using integrated policies and distributed mechanisms for tolerance of intrusion
  • Defending Distributed Denial of Service attacks and detecting and responding towards intrusions
  • Advanced operating systems and ensuring the security of mobile codes
  • Wireless networks , mobile agent and mobile network security
  • Applied cryptography and enhancing reliability and security of networks

At present we are handling projects in all these topics and so our experts are well known about the plus and minus associated with them. Provided sufficient resources and proper technical guidance you can excel in any of these recent research topics in cryptography. 

Interests in creativity and innovations have made our technical team stay highly updated with recent developments. So your doubts regarding any latest cryptography advancements can be resolved instantaneously by us. Let’s now talk more about trending PhD Topics in cryptography

Top 6 Interesting Topics in Cryptography

Latest Research Topics in Cryptography

  • Lattice-based cryptanalysis using post-quantum based cryptography
  • Oblivious RAM and testable calculations using cloud computing methodologies
  • Highly secure processors like Intel SGX and cryptographic protocols such as TLS, Safe multiparty computing protocols, and SSL
  • Argon 2 and Script like memory-hard functions
  • Cryptography for handling Ethereum like smart contracts and Bitcoin-like Cryptocurrencies
  • Cryptography failure leading to attacks and cryptanalysis
  • Encrypted data computation like Fully Homomorphic Encryption and functional encryption

We insist that you interact with us for a complete discussion on the technicalities of these topics which will help you choose the best topic for you. Once you finalize your topic you can leave to us the limitations and issues in it as our engineers will handle them with more ease. With advances spurring every day in cryptography you can find a huge scope for future research in the field. In this regard let us look into the future trends in Cryptography below

Future trends in cryptography

  • Cryptography based computations and implementations in homomorphic encryptions and entrusted data sharing environment
  • An alternative approach for creating ledgers using distributed blockchain technology for enabling third party transactions in a trusted environment
  • Syn cookies and DoS attack prevention using Cryptography methods

In all these ways Cryptography is sure to impact the digital wellbeing of the future World. You will get a great career if you choose Cryptography projects as they have huge scope in both the present and near future. For all these topics of cryptography research, we provide ultimate support in designing projects, thesis writing , proposals, assignments, and publishing papers. So you can contact us anytime for expert tips and advanced guidance in any research topics in cryptography. 

Why Work With Us ?

Senior research member, research experience, journal member, book publisher, research ethics, business ethics, valid references, explanations, paper publication, 9 big reasons to select us.

Our Editor-in-Chief has Website Ownership who control and deliver all aspects of PhD Direction to scholars and students and also keep the look to fully manage all our clients.

Our world-class certified experts have 18+years of experience in Research & Development programs (Industrial Research) who absolutely immersed as many scholars as possible in developing strong PhD research projects.

We associated with 200+reputed SCI and SCOPUS indexed journals (SJR ranking) for getting research work to be published in standard journals (Your first-choice journal).

PhDdirection.com is world’s largest book publishing platform that predominantly work subject-wise categories for scholars/students to assist their books writing and takes out into the University Library.

Our researchers provide required research ethics such as Confidentiality & Privacy, Novelty (valuable research), Plagiarism-Free, and Timely Delivery. Our customers have freedom to examine their current specific research activities.

Our organization take into consideration of customer satisfaction, online, offline support and professional works deliver since these are the actual inspiring business factors.

Solid works delivering by young qualified global research team. "References" is the key to evaluating works easier because we carefully assess scholars findings.

Detailed Videos, Readme files, Screenshots are provided for all research projects. We provide Teamviewer support and other online channels for project explanation.

Worthy journal publication is our main thing like IEEE, ACM, Springer, IET, Elsevier, etc. We substantially reduces scholars burden in publication side. We carry scholars from initial submission to final acceptance.

Related Pages

Our benefits, throughout reference, confidential agreement, research no way resale, plagiarism-free, publication guarantee, customize support, fair revisions, business professionalism, domains & tools, we generally use, wireless communication (4g lte, and 5g), ad hoc networks (vanet, manet, etc.), wireless sensor networks, software defined networks, network security, internet of things (mqtt, coap), internet of vehicles, cloud computing, fog computing, edge computing, mobile computing, mobile cloud computing, ubiquitous computing, digital image processing, medical image processing, pattern analysis and machine intelligence, geoscience and remote sensing, big data analytics, data mining, power electronics, web of things, digital forensics, natural language processing, automation systems, artificial intelligence, mininet 2.1.0, matlab (r2018b/r2019a), matlab and simulink, apache hadoop, apache spark mlib, apache mahout, apache flink, apache storm, apache cassandra, pig and hive, rapid miner, support 24/7, call us @ any time, +91 9444829042, [email protected].

Questions ?

Click here to chat with us

53 Cryptography Essay Topic Ideas & Examples

🏆 best cryptography topic ideas & essay examples, 📌 simple & easy cryptography essay titles, 👍 good essay topics on cryptography.

  • History of Cryptography At the same time, one must know the origins and the first variants of ciphers to understand the complexity and features of modern cryptography.
  • Importance of Cryptography Knowledge in the Work of an IT Project Manager For this reason, it is essential for me to know the features of cryptography algorithms as an IT project manager to ensure the security of customer information and develop the most secure and convenient product.
  • Application of Cryptography in Communications and Networks The symmetric key is encrypted by PGP in order to make it confidential; a public key is sent along with the message and each key is used only once.
  • Biometrics in Cryptography. Desirable Properties Because it is the first step, it is a critical step in the scheme because it is used to ensure that the attacker cannot gain access to the key once the system is compromised.
  • Cryptography: History and Today’s Status Cryptography or encrypting the message is just like a letter, which at the time of posting is sealed in the envelope.
  • Quantum Cryptography for Mobile Phones The increase in the sensitivity of mobile transactions and communication necessitates the need for a strong security mechanism that will protect the confidentiality of the information exchanged using these devices.
  • Cryptography: Modern Block Cipher Algorithms The algorithm was adopted in the US in 2001 by the National Institute of Standards and Technology. The structure of RC5 is Fesitel-like network and has 1 to 255 rounds.
  • Cryptography, Asymmetric and Symmetric algorithms The encryption key is kept public and is known as the “public key” while the decryption key is kept secret and is known as the “private or secret key”.
  • Use Of Visual Cryptography For Binary Images
  • Solution for Cryptography and Network Security 4th Edition
  • The Danger Of Cryptography And Encryption
  • Terrorists Use of Cryptography and Data Encryption Essay
  • The History and Applications of Cryptography
  • Steganography Analysis : Steganography And Cryptography
  • The Woman Who Smashed Codes: The Untold Story of Cryptography Pioneer Elizebeth Friedman
  • Steganography And Visual Cryptography In Computer Forensics Computer Science
  • The Importance Of Cryptography And The Legislative Issues That Surround Government Access
  • The History of Practical Cryptography from Early Century BC to Modern Day
  • The Basic Model Of Visual Cryptography And The Extended Model
  • Importance Of Cryptography And Its Accompanying Security
  • Importance Of Cryptography And Its Effects On The World
  • Why Cryptography Is Important Computer Science
  • The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
  • Cryptography And Its Impact On The World Of Computing Technology
  • The Problem Of Using Public Key Cryptography For Such Attacks
  • Hybrid Cryptography Using Symmetric Key Encryption
  • The Controversy Surrounding Computer Cryptography
  • Cryptography and Steganography For Secure Communication
  • The Impact Of Modern Day Cryptography On Society Today
  • Design of a New Security Protocol Using Hybrid Cryptography Algorithms
  • Quantum Cryptography for Nuclear Command and Control
  • The Purpose and Methods of Using Hashing in Cryptography
  • The Core Items of Cryptography and Encryption
  • Developments in the Study of Cryptography
  • Cryptography : The Concept Of Public Key Cryptography
  • How Cryptography Is Related To Information Technology
  • Cryptography Is The Science Of Writing And Solving Secret
  • National Security Issues and Quantum Cryptography
  • The Role Of Cryptography In Network Security Computer Science
  • Cryptography Is A Technique For Protect Information
  • How Do You Keep A Secret: the History of Cryptography
  • On The Development Of Quantum Computers And Cryptography
  • Marketing: Cryptography and Password Breeches
  • Cryptography Is Essential For Information Systems
  • Definition and Use of Symmetric Data Cryptography and Asymmetric Data Cryptography
  • Cryptography : Using Encryption Decryption Technique
  • Taking a Look at Quantum Cryptography
  • The History Of Cryptography And How It Is Used Today
  • The Use of Prime Numbers in Cryptography
  • Understanding the Concept Behind Cryptography
  • Cryptography And The Issue Of Internet Security
  • Elliptic Curve Cryptography and Its Applications to Mobile Devices
  • First Amendment Research Topics
  • Computer Forensics Essay Topics
  • Hacking Essay Topics
  • Fourth Amendment Essay Topics
  • Identity Theft Essay Ideas
  • Freedom Of Expression Questions
  • Sixth Amendment Topics
  • Internet of Things Topics
  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2023, January 20). 53 Cryptography Essay Topic Ideas & Examples. https://ivypanda.com/essays/topic/cryptography-essay-topics/

"53 Cryptography Essay Topic Ideas & Examples." IvyPanda , 20 Jan. 2023, ivypanda.com/essays/topic/cryptography-essay-topics/.

IvyPanda . (2023) '53 Cryptography Essay Topic Ideas & Examples'. 20 January.

IvyPanda . 2023. "53 Cryptography Essay Topic Ideas & Examples." January 20, 2023. https://ivypanda.com/essays/topic/cryptography-essay-topics/.

1. IvyPanda . "53 Cryptography Essay Topic Ideas & Examples." January 20, 2023. https://ivypanda.com/essays/topic/cryptography-essay-topics/.

Bibliography

IvyPanda . "53 Cryptography Essay Topic Ideas & Examples." January 20, 2023. https://ivypanda.com/essays/topic/cryptography-essay-topics/.

Topics in Cryptography

Computer science 787 cornell university spring 2007.

Instructor: Rafael Pass Time: Tuesdays 10:10-12:00 am. Place: 315 Upson Hall. http://www.cs.cornell.edu/courses/cs787/2007sp/

CS 787 is a seminar-style course in which students will read and present papers on current research in Cryptography. Potential topics include zero knowledge, concurrency and protocol security, database privacy, connections between symbolic and computational security analysis, and cryptographic game theory.

The course will build on material covered in CS 687 , but 687 is not a formal prerequisite for 787.

Potential Topics

Zero Knowledge

Precise Zero Knowledge

Non Black-box Simulation

Concurrency and Protocol Security

Non-malleable Cryptography

Concurrent Zero Knowledge

Universally Composable Security

Relaxed notions of security

Database Privacy and Security

Definitions of Database Privacy

Zero-Knowledge Sets

Private Information Retrieval

Evaluating functions on Encrypted Data

Connections between Symbolic and Computational Security Analysis

Soundness Theorems for Symbolic Security Analysis

Concurrency and Symbolic Analysis

Cryptographic Game Theory

Achieving Better Equilibria using Cryptographic Protocols

Game Theoretic Analysis of Cryptographic Protocols

Potential papers for presentations

·         Silvio Micali and Rafael Pass. Local Zero Knowledge. STOC 2006.

·         Rafael Pass. A Precise Computational Approach to Knowledge.

·         Boaz Barak , How to go Beyond the Black-box Simulation Barrier , FOCS 2002.

·         Dolev , Dwork and Naor . Non-malleable Cryptography , SIAM Journal of Computing, 2000.

·         Concurrent Zero Knowledge: Richarson , Kilian , Petrank , Prabhakaran , Rosen, Sahai [RK00 ], [KP01] [PRS03 ]  

·         Pass. Bounded-Concurrent Secure Multi-party Computation , STOC 2004.

·         Pass and Rosen. New and Improved Constructions of Non- Mallable Cryptographic Protocols, STOC 2005.

·         Pass and Rosen. Concurrent Non Mallable Commitments, FOCS 2005.

·         Barak , Prabhakaran and Sahai . Concurrent Non-malleable Zero Knowledge, FOCS 2006.

·         Pass, Simulation in Quasi-polynomial Time and its application to protocol composition, EUROCRYPT 2003.

·         Micali, Pass, and Rosen. Input-Indistinguishable Computation, FOCS 2006.

·         Ran Canetti, Universally Composable Security , FOCS 2001.

·         Dodis, Canetti, Pass and Walfish. Universally Composable Security with Global Set-up , TCC 2007.

·         Cynthia Dwork , Frank McSherry , Kobbi Nissim , Adam Smith, Calibrating Noise to Sensitivity in Private Data Analysis , TCC 2006.

·         Cynthia Dwork , Differential Privacy , ICALP 2006.

·         Kilian , Micali, and Rabin, Zero-Knowledge Sets , FOCS 2003.

·         Kushilevitz and Ostrovsky , Replication Is Not Needed: Single Database, Computationally-Private Information Retrieval , FOCS 1997.

·         Cachin , Micali and Stadler , Computationally private information retrieval with polylogarithmic communication . EUROCRYPT 1999.

·         Micali, Rabin and Kilian , Zero-Knowledge Sets , FOCS 2003.

·         Dolev , Yao , On the security of public key protocols , IEEE TIT 1983.

·         Abadi , Rogaway : Reconciling Two Views of Cryptography . J. Cryptology 2002.

·         Micciancio , Warinschi : Soundness of formal encryption in the presence of active adversaries . TCC 2004.

·         Canetti and Herzog, Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange)

·         See also Daniele Micciancio's course

·         Halpern and Teague, Rational secret sharing and multiparty computation , STOC 2004 .

·         Izmalkov , Lepinski and Micali. Rational Secure Function Evaluation and Ideal Mechanism Design .   FOCS 2005.

·         Abraham, Dolev , Gonen and Halpern, Distributed Computing Meets Game Theory: Robust Mechanisms for Rational Secret Sharing and Multiparty Computation , PODC 2005.

January 23 (Rafael)

·         Review of Interactive Proofs and Zero Knowledge

·         Precise Zero Knowledge.

January 30 (Rafael)

·         Precise Proofs of Knowledge

·         Witness Indistinguishability .

February 6 (Muthu)

February 13 (Muthu)

February 20 (Rachel)

February 27 (Dustin)

March 6 (Ariel)

March 13 (Michael G)

March 20 (Spring Break)

March 27 (Tudor)

April 3 (Michael C)

April 10 (Tom)

April 17 (Thanh)

April 24 ( Vikram )

  • skip navigation
  • Privacy Policy
  • Accessibility
  • search search
  • Campusplan Campus Map

cryptography dissertation topics

  • Research Topics

Post-Quantum Cryptography

  • Chair Müller-Quade
  • Research Group Rupp
  • Current Projects
  • Publications
  • Completed Projects
  • Quantification of Security
  • Applied Security
  • Cryptographic Voting Procedures
  • Practical Secure Multi-Party Computation
  • Privacy and Fairness
  • Quantum Cryptography
  • Security Notions

Assuming that there will be efficient quantum computers in the "near" future, we want to investigate whether we can already make current protocols secure against quantum algorithms. The research area of post-quantum cryptography searches for secure cryptographic methods under the assumption that in the future a quantum computer can break the current methods. The danger of quantum algorithms is already real, as data can be stored and only later their encryption can be broken and thus the data can be read. This research area is not only about the secure use of these methods, but also about the transition in protocols from current cryptography to post-quantum cryptography. How do we construct cryptoagile quantum-resistant protocols?

In 2016, NIST (National Institute of Technology) declared a standardization process for post-quantum procedures. Supposed quantum-resistant algorithms are assumed to be based on lattice-, code-, and isogeny-based assumptions (and some more). The research area of post-quantum cryptography deals with the analysis of these primitives, exploration of further quantum-resistant methods and their use in theory and practice.

In the area of post-quantum cryptography, the first step is to build up a basic understanding of some underlying mathematical methods such as lattice cryptography.

Following this, we look at how far we can protect previously researched protocols against possible attackers with quantum computers. Here we replace individual primitives with primitives based on lattice-based assumptions, which are possibly quantum-resistant.

Another step also deals with cryptoagility within post-quantum protocols. Here there are different approaches and views on how the transition from the current -- called classical -- to the quantum-resistant -- called post-quantum -- cryptography can work in theory and practice without loss of security.

Studierende mit Blick auf eine Stellwand

We offer a seminar "Post-Quantum Cryptography" every winter semester. In the research-oriented seminar, topics are selected from the standardization process for post-quantum cryptography of NIST. The algorithms are based on different mathematical, supposedly quantum-resistant methods: Lattices, Codes, Isogenies and some more. No prior knowledge is required for the seminar, but we expect a high level of self-motivation. In a series of introductory lectures all participants will be brought up to a basic level before selected topics will be worked on and presented by the students.

In addition, we offer post-quantum cryptography as a topic for student theses or for the module Practice of Research.

-- Just contact us!

Researchers
CS 251   does-not-exist.kit edu
     
CS 276 does-not-exist.kit edu
CS 268    
CS 251   does-not-exist.kit edu
CS 230 does-not-exist.kit edu
CS 251   does-not-exist.kit edu
CS 50.34 250 does-not-exist.kit edu

T4Tutorials.com

Cryptography Research Topics Ideas

What is Cryptography?

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.

List of Research Topics and Ideas of Cryptography.

1. Security protocol using elliptic curve cryptography algorithm for wireless sensor networks 2. Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm 3. An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography 4. Comparison of RISC-V and transport triggered architectures for a postquantum cryptography application 5. A secure and privacy-preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography 6. Continuous-variable quantum cryptography with discrete alphabets: composable security under collective Gaussian attacks 7. Quantum cryptography: Basic principles and methodology 8. Impact of Computational Power on Cryptography 9. Performance improvement of elliptic curve cryptography system using low power, high speed 16× 16 Vedic multiplier based on reversible logic 10. Neural cryptography using optimal structure of neural networks 11. Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography 12. Boolean functions for cryptography and coding theory 13. Experimental authentication of quantum key distribution with post-quantum cryptography 14. A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography 15. Neural cryptography based on generalized tree parity machine for real-life systems 16. Public key versus symmetric key cryptography in client–server authentication protocols 17. Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks 18. Enhancing home security through visual cryptography 19. ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things 20. Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography. 21. SoK: Computer-aided cryptography 22. A novel cryptosystem based on DNA cryptography and randomly generated Mealy machine 23. High-Assurance Cryptography in the Spectre Era 24. Review of the use of human senses and capabilities in cryptography 25. Quantum cryptography with highly entangled photons from semiconductor quantum dots 26. Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities 27. Hybrid state engineering of phase-change metasurface for all-optical cryptography 28. Security in Quantum Cryptography 29. State-of-the-Art Survey of Quantum Cryptography 30. Card-based cryptography meets formal verification 31. New directions in cryptography 32. Nonmalleable cryptography 33. Practical cryptography 34. Quantum cryptography 35. Introduction to cryptography 36. An introduction to cryptography 37. Introduction to cryptography 38. Cryptography 39. Visual cryptography 40. Cryptography: theory and practice 41. Introduction to modern cryptography 42. Handbook of applied cryptography 43. An introduction to mathematical cryptography 44. Cryptography 45. Cryptography: an introduction 46. A course in number theory and cryptography 47. Cryptography engineering 48. Abstract cryptography 49. Introduction to modern cryptography 50. Modern cryptography: theory and practice 51. Lecture notes on cryptography 52. Public-key cryptography 53. Cryptography and network security 54. Algebraic aspects of cryptography 55. An overview of cryptography 56. Experimental quantum cryptography 57. Threshold cryptography 58. Encyclopedia of cryptography and security 59. Foundations of cryptography: volume 2, basic applications 60. Cryptography and network security, 4/E 61. Kleptography: Using cryptography against cryptography 62. Contemporary cryptography 63. Java cryptography 64. Cryptography with chaos 65. Cryptography and data security 66. Guide to elliptic curve cryptography 67. Society and group oriented cryptography: A new concept 68. Cryptography and network security 69. What is cryptography? 70. Foundations of cryptography: volume 1, basic tools 71. Cryptography in 72. New directions in cryptography 73. The first ten years of public-key cryptography 74. Quantum cryptography 75. Limitations on practical quantum cryptography 76. Cryptography and computer privacy 77. Codes and cryptography 78. Understanding cryptography: a textbook for students and practitioners 79. Introduction to cryptography with coding theory 80. Advances in quantum cryptography 81. Everyday cryptography 82. An algebraic method for public-key cryptography 83. Quantum cryptography using any two nonorthogonal states 84. Reconciling two views of cryptography 85. Chaos and cryptography 86. Use of elliptic curves in cryptography 87. An overview of public key cryptography 88. The state of elliptic curve cryptography 89. Controlling access to published data using cryptography 90. Experimental quantum cryptography with qutrits 91. A decade of lattice cryptography 92. Basic methods of cryptography 93. Proxy Cryptography Revisited. 94. Mathematics of public key cryptography 95. Cryptography: a comparative analysis for modern techniques 96. Elliptic curves in cryptography 97. Abstract models of computation in cryptography 98. Complexity and cryptography: an introduction 99. Modern cryptography 100. New field of cryptography: DNA cryptography 101. Physically observable cryptography 102. Cryptography and Network Security: for VTU 103. Relativized cryptography 104. Foundations of cryptography: a primer 105. Quantum cryptography 106. Advances in elliptic curve cryptography 107. Introduction to Cryptography with java Applets 108. An update on quantum cryptography 109. Cryptography 110. Lattice-based cryptography 111. A graduate course in applied cryptography 112. Lightweight Cryptography 113. Visual cryptography for general access structures 114. Quantum cryptography 115. Quantum cryptography in practice 116. Applied quantum cryptography 117. Quantum cryptography. 118. Elliptic curve cryptography in practice 119. Chaos-based cryptography: a brief overview 120. Beginning cryptography with Java 121. Applied cryptography: protocols, algorithms, and source code in C 122. Lattice cryptography for the internet 123. An overview of elliptic curve cryptography 124. Elliptic curves: number theory and cryptography 125. Towards mobile cryptography 126. Applied cryptography 127. Introduction to post-quantum cryptography 128. On cryptography with auxiliary input 129. An overview of public key cryptography 130. Public-key cryptography from different assumptions 131. Public key cryptography in sensor networks—revisited 132. Some recent research aspects of threshold cryptography 133. Cryptography with cellular automata 134. Divertible protocols and atomic proxy cryptography 135. Fault analysis in cryptography 136. Position based cryptography 137. Estimates for practical quantum cryptography 138. Visual cryptography for color images 139. Cryptography with dynamical systems 140. Elliptic curve cryptography 141. Cryptography 142. Cryptography in an algebraic alphabet 143. DNA-based cryptography 144. Group-based cryptography 145. A note on the complexity of cryptography (corresp.) 146. Quantum cryptography based on orthogonal states 147. Certificateless public key cryptography 148. Quantum cryptography without switching 149. The complexity of promise problems with applications to public-key cryptography 150. Quantum cryptography 151. Quantum cryptography based on Bell’s theorem 152. Computer security and cryptography 153. An overview of cryptography 154. The foundational cryptography framework 155. Why cryptography is harder than it looks 156. A primer on cryptography in communications 157. Energy analysis of public-key cryptography for wireless sensor networks 158. A classical introduction to cryptography: Applications for communications security 159. Privacy and authentication: An introduction to cryptography 160. jPBC: Java pairing based cryptography 161. The advantages of elliptic curve cryptography for wireless security 162. Cryptography and machine learning 163. On the foundations of cryptography 164. Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working 165. Report on lightweight cryptography 166. New results on visual cryptography 167. New directions of modern cryptography 168. Algorithms for black-box fields and their application to cryptography 169. Forward-security in private-key cryptography 170. A survey of lightweight-cryptography implementations 171. CryptoLib: Cryptography in Software. 172. Primality and cryptography 173. An introduction to number theory with cryptography 174. Report on post-quantum cryptography 175. Theory and applications of cellular automata in cryptography 176. Hierarchical ID-based cryptography 177. A course in mathematical cryptography 178. Unconditional security in quantum cryptography 179. An introduction to cryptography 180. Applications of multilinear forms to cryptography 181. Elliptic curves and their applications to cryptography: an introduction 182. Chaos-based cryptography: Theory, algorithms and applications 183. Theory and practice of chaotic cryptography 184. Identity-based cryptography 185. Security pitfalls in cryptography 186. Some applications of coding theory in cryptography 187. The impact of quantum computing on present cryptography 188. User’s guide to cryptography and standards 189. Cryptography for developers 190. The “golden” matrices and a new kind of cryptography 191. Network security with openSSL: cryptography for secure communications 192. Extended capabilities for visual cryptography 193. Genetic algorithms in cryptography 194. Elliptic curve cryptography and its applications 195. Cryptography and steganography–A survey 196. Single photon quantum cryptography 197. Quantum cryptography without Bell’s theorem 198. Computational Number Theory and Modern Cryptography 199. Improved schemes for visual cryptography 200. Applications of T-functions in Cryptography 201. The mathematics of public-key cryptography 202. Cryptography Based On Neural Network. 203. A survey of identity-based cryptography 204. Cryptography based on chaotic systems 205. Region incrementing visual cryptography 206. Cryptography from noisy storage 207. Quantum cryptography 208. Quantum cryptography with imperfect apparatus 209. Boolean Functions for Cryptography and Error-Correcting Codes. 210. A survey on various cryptography techniques 211. Information theory, coding and cryptography 212. Fast implementations of RSA cryptography 213. Quantum cryptography with coherent states 214. Concerning certain linear transformation apparatus of cryptography 215. Malicious cryptography: Exposing cryptovirology 216. A comprehensive study of visual cryptography 217. Lightweight cryptography methods 218. Tight finite-key analysis for quantum cryptography 219. Autocompensating quantum cryptography 220. Bridging game theory and cryptography: Recent results and future directions 221. Halftone visual cryptography 222. Fast cryptography in genus 2 223. NanoECC: Testing the limits of elliptic curve cryptography in sensor networks 224. Signal design for good correlation: for wireless communication, cryptography, and radar 225. Quantum communications and cryptography 226. State of the art in lightweight symmetric cryptography 227. Quantum cryptography using larger alphabets 228. Lattice-based cryptography 229. Public-key cryptography for RFID-tags 230. Quantum cryptography with entangled photons 231. Vectorial Boolean Functions for Cryptography. 232. Coding theory and cryptography: the essentials 233. Public-key cryptography and password protocols 234. Software implementation of elliptic curve cryptography over binary fields 235. RSA and public-key cryptography 236. “Plug and play” systems for quantum cryptography 237. Code-based cryptography 238. A three-stage quantum cryptography protocol 239. Public key cryptography 240. On using cognitive models in cryptography 241. Cryptography and game theory: Designing protocols for exchanging information 242. Cryptography and evidence 243. An extension of the Shannon theory approach to cryptography 244. Quantum cryptography with squeezed states 245. Public-key cryptography 246. Cryptography with DNA binary strands 247. Post-quantum cryptography 248. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks 249. Current state of multivariate cryptography 250. On the contrast in visual cryptography schemes 251. Continuous variable quantum cryptography 252. Network security with cryptography 253. Cognicrypt: Supporting developers in using cryptography 254. Quantum cryptography: A survey 255. Lightweight cryptography for the internet of things 256. Elliptic curves and cryptography 257. Cryptography—A selective survey 258. Fast elliptic curve cryptography on FPGA 259. Quantum cryptography with 3-state systems 260. Handbook of elliptic and hyperelliptic curve cryptography 261. The foundations of modern cryptography 262. Discrete chaotic cryptography using external key 263. Leakage-resilient cryptography 264. Colour visual cryptography schemes 265. An introduction to pairing-based cryptography 266. Shorter keys for code based cryptography 267. A survey on cryptography algorithms 268. Image size invariant visual cryptography 269. Cryptography with constant computational overhead 270. A Survey on the Applications of Cryptography 271. Probabilistic visual cryptography schemes 272. How public key cryptography influences wireless sensor node lifetime 273. Quantum cryptography: Public key distribution and coin tossing 274. Abuses in cryptography and how to fight them 275. Experimental quantum cryptography 276. Cryptography in OpenBSD: An Overview. 277. Sharing multiple secrets in visual cryptography 278. Constructions and bounds for visual cryptography 279. Modern Cryptography Primer 280. On the energy cost of communication and cryptography in wireless sensor networks 281. Information-theoretic cryptography 282. Full-field implementation of a perfect eavesdropper on a quantum cryptography system 283. Elliptic curve cryptography engineering 284. Analysis of neural cryptography 285. Wireless security and cryptography: specifications and implementations 286. State of the art in ultra-low power public key cryptography for wireless sensor networks 287. Optimal eavesdropping in quantum cryptography with six states 288. Cryptography from anonymity 289. Cryptography in the multi-string model 290. Introduction to public-key cryptography 291. Review and analysis of cryptography techniques 292. Visual cryptography for grey level images 293. Constructive cryptography–a new paradigm for security definitions and proofs 294. Cryptography using neural network 295. Comparing elliptic curve cryptography and RSA on 8-bit CPUs 296. Progressive color visual cryptography 297. Cryptography and network security (Sie) 298. Performance analysis of elliptic curve cryptography for SSL 299. Hardware architectures for public key cryptography 300. Cryptography against continuous memory attacks 301. Visual cryptography for print and scan applications 302. Cryptography and game theory 303. Cryptography: Current status and future trends 304. The uneasy relationship between mathematics and cryptography 305. A New Approach for Data Cryptography 306. White-box cryptography and an AES implementation 307. Commodity-based cryptography 308. Cryptography in embedded systems: An overview 309. Incremental cryptography and application to virus protection 310. Applied cryptography-protocols, algorithms, and source code in C 311. Foundations of Cryptography:(fragments of a Book 312. Importance of cryptography in network security 313. A toolkit for ring-LWE cryptography 314. Interacting neural networks and cryptography 315. Embedded extended visual cryptography schemes 316. Quantum cryptography with a photon turnstile 317. Fast elliptic curve cryptography in OpenSSL 318. The future of cryptography 319. Practical quantum cryptography based on two-photon interferometry 320. Jasmin: High-assurance and high-speed cryptography 321. Extended visual cryptography for natural images 322. Fundamental elliptic curve cryptography algorithms 323. RFID security without extensive cryptography 324. Hacking commercial quantum cryptography systems by tailored bright illumination 325. Quantum cryptography in free space 326. Low-cost elliptic curve cryptography for wireless sensor networks 327. Quantum cryptography, or unforgeable subway tokens 328. Cryptography, information theory, and error-correction: a handbook for the 21st century 329. Bio-cryptography 330. Differentially uniform mappings for cryptography 331. The black paper of quantum cryptography: real implementation problems 332. A survey paper on cryptography techniques 333. Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy 334. One-way functions are essential for complexity based cryptography 335. Minimalist cryptography for low-cost RFID tags 336. A comparative survey of symmetric and asymmetric key cryptography 337. Tropical cryptography 338. Public-key cryptography standards (PKCS)# 1: RSA cryptography specifications version 2.1 339. Entropy measures and unconditional security in cryptography 340. Torus-based cryptography 341. Fast, efficient error reconciliation for quantum cryptography 342. Serious cryptography: a practical introduction to modern encryption 343. Watermarking is not cryptography 344. SoK: Computer-aided cryptography 345. Quantum cryptography 346. Counterfactual quantum cryptography 347. Cryptography with cellular automata 348. Quantum resistant public key cryptography: a survey 349. Non-interactive public-key cryptography 350. High-dimensional quantum cryptography with twisted light 351. Advances of DNA computing in cryptography 352. Common randomness in information theory and cryptography. I. Secret sharing 353. Basics of contemporary cryptography for IT practitioners 354. A new approach for visual cryptography 355. Human-computer cryptography: An attempt 356. Optimal eavesdropping in cryptography with three-dimensional quantum states 357. Cryptography from learning parity with noise 358. Architectural support for fast symmetric-key cryptography 359. Quantum cryptography approaching the classical limit 360. A noise-based IC random number generator for applications in cryptography 361. An end-to-end systems approach to elliptic curve cryptography 362. Cheating in visual cryptography 363. Image based steganography and cryptography. 364. Braid-based cryptography 365. Quantum cryptography for IoT: aperspective 366. Step construction of visual cryptography schemes 367. Use of cryptography in cloud computing 368. Founding cryptography on oblivious transfer–efficiently 369. Guide to pairing-based cryptography 370. Supersingular curves in cryptography 371. The code book: the science of secrecy from ancient Egypt to quantum cryptography 372. Cryptography using multiple one-dimensional chaotic maps 373. Combining cryptography with biometrics effectively 374. Modern cryptography, probabilistic proofs and pseudorandomness 375. Progressive visual cryptography with unexpanded shares 376. On general construction for extended visual cryptography schemes 377. A quick glance at quantum cryptography 378. A survey on quantum cryptography 379. Protections against differential analysis for elliptic curve cryptography—an algebraic approach— 380. Automotive security: Cryptography for car2x communication 381. Lightweight cryptography for embedded systems–a comparative analysis 382. Elliptic curves suitable for pairing based cryptography 383. High-Assurance Cryptography in the Spectre Era 384. Hiding Data in Images Using Cryptography and Deep Neural Network 385. On the impossibility of cryptography alone for privacy-preserving cloud computing. 386. Discrete chaotic cryptography 387. Towards practical and fast quantum cryptography 388. Chaos-based random number generators-part I: analysis [cryptography] 389. Combinatorial group theory and public key cryptography 390. A study and analysis on symmetric cryptography 391. The theory of neural networks and cryptography 392. NET security and cryptography 393. A novel visual cryptography scheme 394. A brief history of cryptography 395. Pairing-based cryptography at high security levels 396. Postselection technique for quantum channels with applications to quantum cryptography 397. Analysis of public-key cryptography for wireless sensor networks security 398. Neural cryptography 399. Chinese remainder theorem: applications in computing, coding, cryptography 400. Introduction of DNA computing in cryptography 401. Visual cryptography for gray-level images by dithering techniques 402. Simultaneous hardcore bits and cryptography against memory attacks 403. Handbook of financial cryptography and security 404. RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography 405. Use of chaotic dynamical systems in cryptography 406. Cryptography and steganography 407. XOR-based visual cryptography schemes 408. Contrast optimal threshold visual cryptography schemes 409. Exploiting the power of GPUs for asymmetric cryptography 410. Continuous variable quantum cryptography using coherent states 411. High-rate measurement-device-independent quantum cryptography 412. Classical cryptography 413. Non-commutative cryptography and complexity of group-theoretic problems 414. Visual cryptography II: Improving the contrast via the cover base 415. A DNA-based, biomolecular cryptography design 416. Algebraic geometry in coding theory and cryptography 417. Symmetric cryptography in javascript 418. Perfect nonlinear functions and cryptography 419. The laws of cryptography with java code 420. Communications cryptography 421. Cryptography for dummies 422. A pseudo DNA cryptography method 423. Cryptography and information security 424. Common randomness in information theory and cryptography. II. CR capacity 425. Multiparticle entanglement and its applications to cryptography 426. Cryptography and Security Services: Mechanisms and Applications: Mechanisms and Applications 427. Metaphor is the Key: Cryptography, the Clipper Chip, and the Constitution 428. On Post-Modern Cryptography. 429. Bent functions: results and applications to cryptography 430. Entangled state quantum cryptography: eavesdropping on the Ekert protocol 431. An extended visual cryptography algorithm for general access structures 432. Simple identity-based cryptography with mediated RSA 433. Galois field in cryptography 434. Introduction to the feature section on optical chaos and applications to cryptography 435. Quantum privacy amplification and the security of quantum cryptography over noisy channels 436. Towards practical whitebox cryptography: optimizing efficiency and space hardness 437. Evaluation of cryptography usage in android applications 438. Theory of cryptography 439. Survey of visual cryptography schemes 440. Cryptography as a teaching tool 441. Cryptography goes to the cloud 442. Policy-based cryptography and applications 443. High-dimensional intracity quantum cryptography with structured photons 444. Applications of combinatorial designs to communications, cryptography, and networking 445. Cryptography based on delayed chaotic neural networks 446. Cognitive keys in personalized cryptography 447. Multivariate public key cryptography 448. Composability in quantum cryptography 449. Lightweight cryptography: Underlying principles and approaches 450. Cryptography with chaos 451. A new cryptography system and its VLSI realization 452. A survey on IQ cryptography 453. Cryptography and relational database management systems 454. Visual cryptography for biometric privacy 455. Review on network security and cryptography 456. Cryptography 457. Cryptography in the bounded-quantum-storage model 458. Lightweight cryptography for FPGAs 459. Cheating prevention in visual cryptography 460. Sensor data cryptography in wireless sensor networks 461. An energy-efficient reconfigurable public-key cryptography processor 462. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts 463. Finite automata and application to cryptography 464. Incremental cryptography: The case of hashing and signing 465. The complexity of public-key cryptography 466. White-Box Cryptography. 467. Faraday–Michelson system for quantum cryptography 468. An introduction to cryptography 469. Linicrypt: a model for practical cryptography 470. Quantum cryptography beyond quantum key distribution 471. On the relation of error correction and cryptography to an online biometric based identification scheme 472. Elliptic curve cryptography-based access control in sensor networks 473. High-speed hardware implementations of elliptic curve cryptography: A survey 474. Brief history of quantum cryptography: A personal perspective 475. The dark side of “black-box” cryptography or: Should we trust capstone? 476. Cryptography: The science of secret writing 477. Ct-wasm: type-driven secure cryptography for the web ecosystem 478. Code-based cryptography: State of the art and perspectives 479. Quantum cryptography on multiuser optical fibre networks 480. Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing 481. Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography 482. Optical multilevel authentication based on singular value decomposition ghost imaging and secret sharing cryptography 483. Data Security System for A Bank Based on Two Different Asymmetric Algorithms Cryptography 484. SoK: How (not) to Design and Implement Post-Quantum Cryptography. 485. Low Area PRESENT Cryptography in FPGA Using TRNG-PRNG Key Generation 486. Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified Swarm Optimization and Particle Swarm Optimization for … 487. An encrypted multitone modulation method for physical layer security based on chaotic cryptography 488. Network Coding-Based Post-Quantum Cryptography 489. Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography 490. Security analysis of Reversible Logic Cryptography Design with LFSR key on 32-bit Microcontroller 491. Disappearing Cryptography in the Bounded Storage Model. 492. LNGate: Powering IoT with Next Generation Lightning Micro-payments using Threshold Cryptography 493. Resistant Blockchain Cryptography to Quantum Computing Attacks 494. Image Encryption and Authentication with Elliptic Curve Cryptography and Multidimensional Chaotic Maps 495. Implementation of Modified GSO Based Magic Cube Keys Generation in Cryptography 496. Service layer security architecture for IoT using biometric authentication and cryptography technique 497. A Compact FPGA-Based Accelerator for Curve-Based Cryptography in Wireless Sensor Networks 498. Digital signature authentication using asymmetric key cryptography with different byte number 499. Novel Low-Complexity Polynomial Multiplication over Hybrid Fields for Efficient Implementation of Binary Ring-LWE Post-Quantum Cryptography 500. Innovative Dual-Binary-Field Architecture for Point Multiplication of Elliptic Curve Cryptography 501. Asymmetric multiple image elliptic curve cryptography 502. Research of Combining Blockchain in the Course Reform of Cryptography by Experiential Teaching 503. Lightweight Encryption Using Incremental Cryptography 504. Quantum cryptography and security analysis 505. Applications of Cryptography in Database: A Review 506. Robust Reversible Watermarking in Encrypted Image with Secure Multi-party based on Lightweight Cryptography 507. An Application of p-Fibonacci Error-Correcting Codes to Cryptography 508. Flip Extended Visual Cryptography for Gray-Scale and Color Cover Images 509. Cryptography in Cloud Computing 510. Quantum Cryptography and Blockchain System: Fast and Secured Digital Communication System 511. Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques 512. Compound Cryptography for Internet of Things Based Industrial Automation 513. Cryptography Using Chaos In Communication Systems 514. Asymmetric Key Cryptography based Ad-hoc on Demand Distance Vector Protocol (AC-AODV) 515. Multiple-image encryption based on Toeplitz matrix ghost imaging and elliptic curve cryptography 516. NIST Lightweight Cryptography Standardization Process: Classification of Second Round Candidates, Open Challenges, and Recommendations. 517. A Strategy Roadmap for Post-quantum Cryptography 518. APPLIED CRYPTOGRAPHY KNOWLEDGE AREA 519. Low-power Reconfigurable Architecture of Elliptic Curve Cryptography for IoT 520. Preventing Counterfeit Products Using Cryptography, QR Code and Webservice 521. Correction to: Pro Cryptography and Cryptanalysis with C++ 20 522. Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X 523. Cryptography Leads the Next Wave of Societal Change 524. Problems in cryptography and cryptanalysis 525. A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography 526. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography 527. Smaller Keys for Code-Based Cryptography: McEliece Cryptosystems with Convolutional Encoders 528. Cryptography Threats 529. Protecting Cryptography Against Compelled Self-Incrimination 530. Research on a novel construction of probabilistic visual cryptography scheme (k, n, 0, 1, 1)- PVCS for threshold access structures 531. Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography 532. Preface: Special Issue on Card-Based Cryptography 533. Digital Signature Authentication for a Bank Using Asymmetric Key Cryptography Algorithm and Token Based Encryption 534. A novel approach using elliptic curve cryptography to mitigate Two-Dimensional attacks in mobile Ad hoc networks 535. An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things 536. … SMEER (Secure Multitier Energy Efficient Routing Protocol) and SCOR (Secure Elliptic curve based Chaotic key Galois Cryptography on Opportunistic Routing) 537. A hybrid encryption scheme based on optical scanning cryptography and Fibonacci–Lucas transformation 538. Preservation of data using magic squares in Asymmetric key cryptography 539. On properties of translation groups in the affine general linear group with applications to cryptography 540. Cryptography Fundamentals 541. Techniques of Steganography and Cryptography in Digital Transformation 542. Card-based Cryptography with Dihedral Symmetry 543. Lightweight Cryptography Algorithms for Internet of Things enabled Networks: An Overview 544. PRIVATE PERMUTATIONS IN CARD-BASED CRYPTOGRAPHY 545. A Cryptography and Machine Learning Based Authentication for Secure Data-Sharing in Federated Cloud Services Environment 546. Secure medical image transmission using modified leading diagonal sorting with probabilistic visual cryptography 547. Device-Independent Quantum Cryptography 548. Galois Field Arithmetic Operations using Xilinx FPGAs in Cryptography 549. Cryptography-based deep artificial structure for secure communication using IoT-enabled cyber-physical system 550. An improved hybrid scheme for e-payment security using elliptic curve cryptography

Research Topics Computer Science

 
   
 

Top 10 research topics of Cryptography | list of research topics of Cryptography | trending research topics of Cryptography | research topics for dissertation in Cryptography | dissertation topics of Cryptography in pdf | dissertation topics in Cryptography | research area of interest Cryptography | example of research paper topics in Cryptography | top 10 research thesis topics of Cryptography | list of research thesis topics of Cryptography| trending research thesis topics of Cryptography | research thesis topics for dissertation in Cryptography | thesis topics of Cryptography in pdf | thesis topics in Cryptography | examples of thesis topics of Cryptography | PhD research topics examples of Cryptography | PhD research topics in Cryptography | PhD research topics in computer science | PhD research topics in software engineering | PhD research topics in information technology | Masters (MS) research topics in computer science | Masters (MS) research topics in software engineering | Masters (MS) research topics in information technology | Masters (MS) thesis topics in Cryptography.

Related Posts:

  • Cryptography Solved MCQs Questions Answers
  • Computational Geometry Research Topics ideas
  • Dynamic Networks Research Topics ideas
  • Research Topics Ideas of Information Privacy
  • Research Topics Ideas of Operating Systems
  • Probabilistic algorithms Research Topics Ideas

You must be logged in to post a comment.

  • Our Promise
  • Our Achievements
  • Our Mission
  • Proposal Writing
  • System Development
  • Paper Writing
  • Paper Publish
  • Synopsis Writing
  • Thesis Writing
  • Assignments
  • Survey Paper
  • Conference Paper
  • Journal Paper
  • Empirical Paper
  • Journal Support
  • Latest 12+ Cryptography Topics for Project

The term cryptography refers to the security technique that is used to prevent the private networks’ data transmission from unauthorized individuals . In fact, illegitimate users of the Internet are trying to steal highly confidential data to interrupt the network. We are bringing this exclusive article to the enthusiasts who are surfing for the interesting cryptography topics for project .  

What is known as cryptography? 

In short, it is a method of warehousing (storing) & transposing data to the intended one within the specific formats. They involve the process of converting the plain texts (normal texts) into ciphertexts (meaningless texts) . Besides they are not only performing security services but also identifying the legitimate users by user authentication. In recent days, cryptography techniques are getting so much weightage in the technical industry .

Hence there are numerous opportunities are exist to explore more. By doing cryptography projects you can grab your dream core jobs. Our technical team of concern has lighted up every section of this article with essential and handy notes to make the students understanding better implementation of cryptography topics for project. Now let us start to brainstorm the areas of cryptography by reading this article completely. Primarily, we will have a section about the overview of cryptography .

  • Kryptos & Graphein are the 2 greek terms in which cryptography is derived
  • The term Kryptos refers to the meaning called  hidden  In addition, the term Graphein refers to the meaning called  to write

This is how the term cryptography is derived from the 2 Greek words. As we are already discussed cryptography here we contemplated the section to give the derivations . Hence, we hope that this section offered you the interesting unknown fact of cryptography.

In the upcoming section, we clearly mentioned to you the fundamental aspects of the cryptography systems to make your understanding better in that way too. Are you ready to know about them? Come on guys lets we learn and enrich together.

Fundamentals of Cryptographic Systems

  • Stream cipher
  • Block cipher
  • Multiple data usages
  • Replacement of the texts & bits
  • Arrangements of the transpositions
  • Symmetric or private keys
  • Asymmetric or public keys

The foregoing section revealed to you the fundamental aspects involved in cryptography. In addition to the above-mentioned phases, our technical team wanted to list out the diverse terminologies used in the cryptography systems for the ease of your understanding. Usually, cryptography is involved with the four predominant & major terms that are mentioned in the immediate passage. Are you getting interested? Yes, we know your thoughts. Let’s have quick insights.

Important Terminologies of Cryptography

  • It is a kind of mathematical function used to convert the plain texts
  • It is the opposite process of the encryption
  • It converts the ciphertexts into plain (normal) text
  • These are strings used to encrypt & decrypt the texts
  • It brings out the information inputted in the crypto messages
  • Encryption converts the plain texts into ciphertexts
  • Plain text- normal text; ciphertext- arbitrary sequences

The aforesaid are the major 4 terminologies often used in the cryptographic concepts . Before going to the next section, we want to comment about ourselves. As a matter of fact, our research paper articles are getting published in the top journals called IEEE and so on. Consequently, our articles are getting weightage in the industry as well.

For the reason that our articles are all the time determined with crystal clear points which expresses the meticulous and effective hints to the students to choose cryptography topics for project . Our technicians are always passionate about offering cryptography-oriented research & project assistance to the students . Now we can have the section with the contents of cryptography types.   

Types of Cryptography

  • Cipher texts are used to generate hashing values
  • Plain texts are being used to fix the hash value length
  • Retrieving plain text from the ciphertext is a little complex
  • Hash functions don’t require any public/private keys
  • Symmetric keys are otherwise known as secret/private keys
  • A single key is enough to perform both encryption & decryption
  • Yet, a single key application is unsecure while data transmission
  • Asymmetric keys are otherwise known as public keys
  • This cryptography makes use of the dual keys named encryption & decryption
  • Pair of keys such as private key & public keys are generated

The listed above are the 3 types of cryptography in which the whole concept is running. Symmetric, asymmetric & hash functions are playing a dominant role in the cryptographic systems and giving their significant roles to secure the transmission by converting the texts in other forms which may look like garbage value to the external parties who are not intended to that message. In this regard, let’s try to understand the encryption techniques used the cryptography for your better understanding.

What are the Encryption Techniques in Cryptography? 

  • Digital Signature Algorithm
  • Efficient & Compact Subgroup Trace Representation
  • EIGAMAI & Diffie Hellman
  • Rivest Shamir Adleman
  • Tiny Encryption
  • RC6 & SEED
  • Kasumi & Serpent
  • Blowfish & Twofish
  • International Encryption Standard
  • Advanced Encryption Standard
  • Data Encryption Standard

The said are the encryption techniques that are getting practiced in the cryptography concepts. On the other hand, there are top 5 cryptography algorithms that are used to make the communication transmission with the sensitive data as much as strong. Yes, our professionals have showcased you the top 5 cryptography algorithms for the ease of your understanding in other words they are the universal algorithms. Now let us get into that next phase.

Top 5 Cryptography Algorithms

  • Big data transmission are encrypted by these algorithms
  • It makes use of the 256 & 192 bits for the data encryption
  • It is the resistant technique that tackles every cyber attack
  • Triple DES makes use of the public, private & hashing keys
  • They are compatible with the 56 & 168-bit lengths
  • It is the symmetric (private) key-based technique
  • It has a key length of up to 256 bits
  • Blow fishes segment the ciphertexts into 64 bits & texts into blocks
  • They are high speed & efficient to encrypt the data individually
  • RSA is the data encryption standard that is broadcasted over the network
  • In addition, it is the asymmetric (public) key oriented technique

The above listed are the top 5 cryptography algorithms used by world-class engineers over the world. In fact, you can also make use of these cryptography algorithms to make your communication channels better manner. For this, you may need experts’ advice! Actually, we do have subject matter experts as our technical team. As our main objective is to help the students in the technical fields you could approach our researchers at any time.

Besides, it is also important to measure the performance of the cryptography techniques. Yes, my dear students, there are some important measures are being practiced to analyze the cryptographic performance. If you don’t know don’t squeeze your heads!!! We are actually going to let you know the same for the ease of your understanding.

Important Measures of Cryptography

  • Key Maintenance
  • Scalability
  • Cost-Effective
  • Data Storage/Warehousing
  • Data Complication
  • Length of Hash
  • Key Words in Data
  • Round Counts
  • Size of Block
  • Size of Key
  • Effectiveness

The aforementioned are the measures used to evaluate the performance of cryptography . Moreover, cryptography is facing some issues while they are progressing. You may get questions here on what will be the issue does the cryptographic systems faces. For this, our experts have pointed out them to make you much understand.

What are Cryptographic Issues?

  • Miscarries the system to limit or bound by means of accessing vulnerable areas
  • A centralized cryptographic system fails to label the application weakness
  • Vulnerabilities can arise if confidential data doesn’t properly warehouse
  • Encrypting the exact sensitive data in vulnerable areas may cause complex

These are some of the issues that are arising while involving this technique in data transmission. However, we can overcome these issues with several solutions to formulate interesting cryptography topics for project . Yes, our researchers of the institute have proposed some solutions for the same issues in the immediate section.

Solutions for Cryptography Issues 

  • Blockchain networks assure the best security leverages & never trusts anyone
  • Data transmitted has been duplicated in the distributed ledger
  • If data is corrupted then the rest parties in the network also reject the same data
  • Modify the sensitive data into random sequences of bits
  • Detect the legitimate & illegitimate user accesses and control it
  • Rewrite the memory locations which doesn’t require to be in memory
  • Detect the confidential data and encrypt the same even though in hard disks
  • Rewrite the sensible data in a way that cannot be overwritten again

The aforementioned are the solutions to the previous section which is covered with the issues. So that, developers presented in the technical world highly trust the cryptographic allied security techniques & algorithms. To be honest, cryptographic algorithms are having much strength by means of providing security to unreliable networks . The security strength of the network can be defined by the size of cryptographic keys used. The strength of the network is articulated in bits. In this regard, let us have further discussions of the different classes of cryptography algorithms that are contributing to the security services.

Different Classes of Cryptography Algorithms

  • Key Segregation & Usage
  • Key Carriage Systems
  • Covenant Devices & Key Generation
  • Authentication Systems
  • Asymmetric Ciphers
  • Digital Signature & Message Recoveries
  • Asymmetric Techniques
  • Message Authentication Codes
  • Hashing Cryptography
  • Stream Ciphers
  • Block Ciphers

These are the different classes of cryptography algorithms. As this article is titled with the cryptography topics for project here we would like to mention the major and recent topics in cryptography for your valuable considerations . Are you ready to know about them? Come on let us also brainstorm it.

Top 12 Interesting Cryptography Topics for Project

  • Fingerprinting & Watermarking
  • Hybrid & Asymmetric Key Encryption
  • Security in Peer-to-peer Groups
  • Threshold Cryptography & Multi-Party Multiplication
  • Key Maintenance & Distribution
  • Authentication & Prescribed Techniques
  • Digital Forensics & Security
  • Number Theories & Elliptic Curve Cryptography
  • Traitor Tracing & Transmission Encryption
  • Hashing & Block Ciphers
  • Secrecy in E-Voting
  • Database Security & Privacy and Access Control

The above listed are some of the latest topics in cryptography apart from this we do have plenteous ideas in our packets. If you do want more details in these areas you are always welcome to have our opinions at any time because we are assisting students from al over the world. In addition to the above-listed sections, we would also like to transfer our knowledge in the research areas too. Shall we get into that section? Here we go!!!!

Important Research Areas in Cryptography

  • Privacy-preservation in image slicing
  • Authentication by OTP & image compressions
  • Image-based stenographic techniques
  • Multimedia image-based privacy & security
  • Prevention schemes in image sharing
  • Visible image pixels & optical cryptography
  • Encryption & decryption in images
  • Multimedia resource maintenance on clouds
  • Big data security in android mobile devices
  • Big data privacy & forensics on clouds
  • IoT based on big data security in mobiles
  • Secured computation outsourcing
  • Privacy & security in industrial mechanisms
  • Encrypted data searching & big data filtering
  • Big data log analysis
  • Cloud APTs leveraging, cyber criminality & security
  • Sandbox virtualization & security
  • Virtual machinewares seclusion
  • New malware investigation
  • Network-based steganography
  • Cloud-based cyber attacks
  • Network Security & privacy in hybrid clouds
  • Cloud architecture auditing
  • DNA based cryptography

These are some of the possible research areas of the cryptographic concepts. At this time, we felt that it will be better to highlight the future trends of the cryptography systems that will help you a lot. Hence we are going to cover the next section with the futuristic trends of cryptography for the ease of your understanding . Are you interested? Come on, guys!!!!  

Future Trends of Cryptography 

  • Enhanced cryptographic algorithms & techniques
  • Newfangled cryptanalysis methodologies
  • Improved computing power

The aforementioned are some of the future trends of cryptography. On the other hand, we can inject our innovations into the cryptographic concepts by means of conducting researches in the determined areas. So far, we have come up with the essential concepts of cryptography if you do further want any details in the cryptography topics for project you can feel free to approach our   technicians in fact we are delighted to serve you in the areas of research and other allied works.

MILESTONE 1: Research Proposal

Finalize journal (indexing).

Before sit down to research proposal writing, we need to decide exact journals. For e.g. SCI, SCI-E, ISI, SCOPUS.

Research Subject Selection

As a doctoral student, subject selection is a big problem. Phdservices.org has the team of world class experts who experience in assisting all subjects. When you decide to work in networking, we assign our experts in your specific area for assistance.

Research Topic Selection

We helping you with right and perfect topic selection, which sound interesting to the other fellows of your committee. For e.g. if your interest in networking, the research topic is VANET / MANET / any other

Literature Survey Writing

To ensure the novelty of research, we find research gaps in 50+ latest benchmark papers (IEEE, Springer, Elsevier, MDPI, Hindawi, etc.)

Case Study Writing

After literature survey, we get the main issue/problem that your research topic will aim to resolve and elegant writing support to identify relevance of the issue.

Problem Statement

Based on the research gaps finding and importance of your research, we conclude the appropriate and specific problem statement.

Writing Research Proposal

Writing a good research proposal has need of lot of time. We only span a few to cover all major aspects (reference papers collection, deficiency finding, drawing system architecture, highlights novelty)

MILESTONE 2: System Development

Fix implementation plan.

We prepare a clear project implementation plan that narrates your proposal in step-by step and it contains Software and OS specification. We recommend you very suitable tools/software that fit for your concept.

Tools/Plan Approval

We get the approval for implementation tool, software, programing language and finally implementation plan to start development process.

Pseudocode Description

Our source code is original since we write the code after pseudocodes, algorithm writing and mathematical equation derivations.

Develop Proposal Idea

We implement our novel idea in step-by-step process that given in implementation plan. We can help scholars in implementation.

Comparison/Experiments

We perform the comparison between proposed and existing schemes in both quantitative and qualitative manner since it is most crucial part of any journal paper.

Graphs, Results, Analysis Table

We evaluate and analyze the project results by plotting graphs, numerical results computation, and broader discussion of quantitative results in table.

Project Deliverables

For every project order, we deliver the following: reference papers, source codes screenshots, project video, installation and running procedures.

MILESTONE 3: Paper Writing

Choosing right format.

We intend to write a paper in customized layout. If you are interesting in any specific journal, we ready to support you. Otherwise we prepare in IEEE transaction level.

Collecting Reliable Resources

Before paper writing, we collect reliable resources such as 50+ journal papers, magazines, news, encyclopedia (books), benchmark datasets, and online resources.

Writing Rough Draft

We create an outline of a paper at first and then writing under each heading and sub-headings. It consists of novel idea and resources

Proofreading & Formatting

We must proofread and formatting a paper to fix typesetting errors, and avoiding misspelled words, misplaced punctuation marks, and so on

Native English Writing

We check the communication of a paper by rewriting with native English writers who accomplish their English literature in University of Oxford.

Scrutinizing Paper Quality

We examine the paper quality by top-experts who can easily fix the issues in journal paper writing and also confirm the level of journal paper (SCI, Scopus or Normal).

Plagiarism Checking

We at phdservices.org is 100% guarantee for original journal paper writing. We never use previously published works.

MILESTONE 4: Paper Publication

Finding apt journal.

We play crucial role in this step since this is very important for scholar’s future. Our experts will help you in choosing high Impact Factor (SJR) journals for publishing.

Lay Paper to Submit

We organize your paper for journal submission, which covers the preparation of Authors Biography, Cover Letter, Highlights of Novelty, and Suggested Reviewers.

Paper Submission

We upload paper with submit all prerequisites that are required in journal. We completely remove frustration in paper publishing.

Paper Status Tracking

We track your paper status and answering the questions raise before review process and also we giving you frequent updates for your paper received from journal.

Revising Paper Precisely

When we receive decision for revising paper, we get ready to prepare the point-point response to address all reviewers query and resubmit it to catch final acceptance.

Get Accept & e-Proofing

We receive final mail for acceptance confirmation letter and editors send e-proofing and licensing to ensure the originality.

Publishing Paper

Paper published in online and we inform you with paper title, authors information, journal name volume, issue number, page number, and DOI link

MILESTONE 5: Thesis Writing

Identifying university format.

We pay special attention for your thesis writing and our 100+ thesis writers are proficient and clear in writing thesis for all university formats.

Gathering Adequate Resources

We collect primary and adequate resources for writing well-structured thesis using published research articles, 150+ reputed reference papers, writing plan, and so on.

Writing Thesis (Preliminary)

We write thesis in chapter-by-chapter without any empirical mistakes and we completely provide plagiarism-free thesis.

Skimming & Reading

Skimming involve reading the thesis and looking abstract, conclusions, sections, & sub-sections, paragraphs, sentences & words and writing thesis chorological order of papers.

Fixing Crosscutting Issues

This step is tricky when write thesis by amateurs. Proofreading and formatting is made by our world class thesis writers who avoid verbose, and brainstorming for significant writing.

Organize Thesis Chapters

We organize thesis chapters by completing the following: elaborate chapter, structuring chapters, flow of writing, citations correction, etc.

Writing Thesis (Final Version)

We attention to details of importance of thesis contribution, well-illustrated literature review, sharp and broad results and discussion and relevant applications study.

How PhDservices.org deal with significant issues ?

1. novel ideas.

Novelty is essential for a PhD degree. Our experts are bringing quality of being novel ideas in the particular research area. It can be only determined by after thorough literature search (state-of-the-art works published in IEEE, Springer, Elsevier, ACM, ScienceDirect, Inderscience, and so on). SCI and SCOPUS journals reviewers and editors will always demand “Novelty” for each publishing work. Our experts have in-depth knowledge in all major and sub-research fields to introduce New Methods and Ideas. MAKING NOVEL IDEAS IS THE ONLY WAY OF WINNING PHD.

2. Plagiarism-Free

To improve the quality and originality of works, we are strictly avoiding plagiarism since plagiarism is not allowed and acceptable for any type journals (SCI, SCI-E, or Scopus) in editorial and reviewer point of view. We have software named as “Anti-Plagiarism Software” that examines the similarity score for documents with good accuracy. We consist of various plagiarism tools like Viper, Turnitin, Students and scholars can get your work in Zero Tolerance to Plagiarism. DONT WORRY ABOUT PHD, WE WILL TAKE CARE OF EVERYTHING.

3. Confidential Info

We intended to keep your personal and technical information in secret and it is a basic worry for all scholars.

  • Technical Info: We never share your technical details to any other scholar since we know the importance of time and resources that are giving us by scholars.
  • Personal Info: We restricted to access scholars personal details by our experts. Our organization leading team will have your basic and necessary info for scholars.

CONFIDENTIALITY AND PRIVACY OF INFORMATION HELD IS OF VITAL IMPORTANCE AT PHDSERVICES.ORG. WE HONEST FOR ALL CUSTOMERS.

4. Publication

Most of the PhD consultancy services will end their services in Paper Writing, but our PhDservices.org is different from others by giving guarantee for both paper writing and publication in reputed journals. With our 18+ year of experience in delivering PhD services, we meet all requirements of journals (reviewers, editors, and editor-in-chief) for rapid publications. From the beginning of paper writing, we lay our smart works. PUBLICATION IS A ROOT FOR PHD DEGREE. WE LIKE A FRUIT FOR GIVING SWEET FEELING FOR ALL SCHOLARS.

5. No Duplication

After completion of your work, it does not available in our library i.e. we erased after completion of your PhD work so we avoid of giving duplicate contents for scholars. This step makes our experts to bringing new ideas, applications, methodologies and algorithms. Our work is more standard, quality and universal. Everything we make it as a new for all scholars. INNOVATION IS THE ABILITY TO SEE THE ORIGINALITY. EXPLORATION IS OUR ENGINE THAT DRIVES INNOVATION SO LET’S ALL GO EXPLORING.

Client Reviews

I ordered a research proposal in the research area of Wireless Communications and it was as very good as I can catch it.

I had wishes to complete implementation using latest software/tools and I had no idea of where to order it. My friend suggested this place and it delivers what I expect.

It really good platform to get all PhD services and I have used it many times because of reasonable price, best customer services, and high quality.

My colleague recommended this service to me and I’m delighted their services. They guide me a lot and given worthy contents for my research paper.

I’m never disappointed at any kind of service. Till I’m work with professional writers and getting lot of opportunities.

- Christopher

Once I am entered this organization I was just felt relax because lots of my colleagues and family relations were suggested to use this service and I received best thesis writing.

I recommend phdservices.org. They have professional writers for all type of writing (proposal, paper, thesis, assignment) support at affordable price.

You guys did a great job saved more money and time. I will keep working with you and I recommend to others also.

These experts are fast, knowledgeable, and dedicated to work under a short deadline. I had get good conference paper in short span.

Guys! You are the great and real experts for paper writing since it exactly matches with my demand. I will approach again.

I am fully satisfied with thesis writing. Thank you for your faultless service and soon I come back again.

Trusted customer service that you offer for me. I don’t have any cons to say.

I was at the edge of my doctorate graduation since my thesis is totally unconnected chapters. You people did a magic and I get my complete thesis!!!

- Abdul Mohammed

Good family environment with collaboration, and lot of hardworking team who actually share their knowledge by offering PhD Services.

I enjoyed huge when working with PhD services. I was asked several questions about my system development and I had wondered of smooth, dedication and caring.

I had not provided any specific requirements for my proposal work, but you guys are very awesome because I’m received proper proposal. Thank you!

- Bhanuprasad

I was read my entire research proposal and I liked concept suits for my research issues. Thank you so much for your efforts.

- Ghulam Nabi

I am extremely happy with your project development support and source codes are easily understanding and executed.

Hi!!! You guys supported me a lot. Thank you and I am 100% satisfied with publication service.

- Abhimanyu

I had found this as a wonderful platform for scholars so I highly recommend this service to all. I ordered thesis proposal and they covered everything. Thank you so much!!!

Related Pages

Get the Reddit app

For people interested in the mathematical and theoretical side of modern cryptography.

Research Topic on Cryptography for master's thesis

hi every one, currently I'm doing my masters degree in cyber security, i want my thesis topic to be in cryptography but i have a limited knowledge in this subject, i have taken an introductory course in cryptography and read professor's Paar book, but still i can't decide which topic is doable for my knowledge level and time constraints, unfortunately my advisor is of no help as he is always busy and he simply does not care, can you guys suggest research points/subjects that are suitable for a master's thesis ? thank you.

By continuing, you agree to our User Agreement and acknowledge that you understand the Privacy Policy .

Enter the 6-digit code from your authenticator app

You’ve set up two-factor authentication for this account.

Enter a 6-digit backup code

Create your username and password.

Reddit is anonymous, so your username is what you’ll go by here. Choose wisely—because once you get a name, you can’t change it.

Reset your password

Enter your email address or username and we’ll send you a link to reset your password

Check your inbox

An email with a link to reset your password was sent to the email address associated with your account

Choose a Reddit account to continue

For IEEE Members

Ieee spectrum, follow ieee spectrum, support ieee spectrum, enjoy more free content and benefits by creating an account, saving articles to read later requires an ieee spectrum account, the institute content is only available for members, downloading full pdf issues is exclusive for ieee members, downloading this e-book is exclusive for ieee members, access to spectrum 's digital edition is exclusive for ieee members, following topics is a feature exclusive for ieee members, adding your response to an article requires an ieee spectrum account, create an account to access more content and features on ieee spectrum , including the ability to save articles to read later, download spectrum collections, and participate in conversations with readers and editors. for more exclusive content and features, consider joining ieee ., join the world’s largest professional organization devoted to engineering and applied sciences and get access to all of spectrum’s articles, archives, pdf downloads, and other benefits. learn more about ieee →, join the world’s largest professional organization devoted to engineering and applied sciences and get access to this e-book plus all of ieee spectrum’s articles, archives, pdf downloads, and other benefits. learn more about ieee →, access thousands of articles — completely free, create an account and get exclusive content and features: save articles, download collections, and talk to tech insiders — all free for full access and benefits, join ieee as a paying member., quantum cryptography has everyone scrambling, china, india, the eu, and the us are all pursuing divergent approaches.

Margo Anderson is senior associate editor and telecommunications editor at IEEE Spectrum.

Conceptual illustration of a key and quantum imagery with tones of orange, green and yellow.

While the technology world awaits NIST’s latest “post-quantum” cryptography standards this summer, a parallel effort is underway to also develop cryptosystems that are grounded in quantum technology—what are called quantum-key distribution or QKD systems.

As a result, India, China, and a range of technology organizations in the European Union and United States are researching and developing QKD and weighing standards for the nascent cryptography alternative. And the biggest question of all is how or if QKD fits into a robust, reliable, and fully future-proof cryptography system that will ultimately become the global standard for secure digital communications into the 2030s. As in any emerging technology standard, different players are staking claims on different technologies and implementations of those technologies. And many of the big players are pursuing such divergent options because no technology is a clear winner at the moment.

According to Ciel Qi , a research analyst at the New York-based Rhodium Group , there’s one clear leader in QKD research and development—at least for now. “While China likely holds an advantage in QKD-based cryptography due to its early investment and development, others are catching up,” says Qi.

Two different kinds of “quantum secure” tech

At the center of these varied cryptography efforts is the distinction between QKD and post-quantum cryptography (PQC) systems. QKD is based on quantum physics, which holds that entangled qubits can store their shared information so securely that any effort to uncover it is unavoidably detectable. Sending pairs of entangled-photon qubits to both ends of a network provides the basis for physically secure cryptographic keys that can lock down data packets sent across that network.

Typically, quantum cryptography systems are built around photon sources that chirp out entangled photon pairs —where photon A heading down one length of fiber has a polarization that’s perpendicular to the polarization of photon B heading in the other direction. The recipients of these two photons perform separate measurements that enable both recipients to know that they and only they have the shared information transmitted by these photon pairs. (Otherwise, if a third party had intervened and measured one or both photons first, the delicate photon states would have been irreparably altered before reaching the recipients.)

“People can’t predict theoretically that these PQC algorithms won’t be broken one day.” —Doug Finke, Global Quantum Intelligence

This shared bit the two people on opposite ends of the line have in common then becomes a 0 or 1 in a budding secret key that the two recipients build up by sharing more and more entangled photons. Build up enough shared secret 0s and 1s between sender and receiver, and that secret key can be used for a type of strong cryptography, called a one-time pad , that guarantees a message’s safe transmission and faithful receipt by only the intended recipient .

By contrast, post-quantum cryptography (PQC) is based not around quantum physics but pure math, in which next-generation cryptographic algorithms are designed to run on conventional computers. And it’s the algorithms’ vast complexity that makes PQC security systems practically uncrackable, even by a quantum computer . So NIST—the U.S. National Institute of Standards and Technology —is developing gold-standard PQC systems that will undergird tomorrow’s post-quantum networks and communications.

The big problem with the latter approach, says Doug Finke, chief content officer of the New York-based Global Quantum Intelligence , is PQC is only believed (on very, very good but not infallible evidence ) to be uncrackable by a fully-grown quantum computer. PQC, in other words, cannot necessarily offer the ironclad “quantum security” that’s promised.

“People can’t predict theoretically that these PQC algorithms won’t be broken one day,” Finke says. “On the other hand, QKD—there are theoretical arguments based on quantum physics that you can’t break a QKD network.”

That said, real-world QKD implementations might still be hackable via side-channel , device-based, and other clever attacks . Plus, QKD also requires direct access to a quantum-grade fiber optics network and sensitive quantum communications tech, neither of which is exactly commonplace today. “For day-to-day stuff, for me to send my credit card information to Amazon on my cellphone,” Finke says, “I’m not going to use QKD.”

China’s early QKD lead dwindling

According to Qi, China may have originally picked QKD as a focal point of their quantum technology development in part because the U.S. was not directing its efforts that way. “[The] strategic focus on QKD may be driven by China’s desire to secure a unique technological advantage, particularly as the U.S. leads in PQC efforts globally,” she says.

In particular, she points to ramped up efforts to use satellite uplinks and downlinks as the basis for free-space Chinese QKD systems . Citing as a source China’s “father of quantum,” Pan Jianwei , Qi says, “To achieve global quantum network coverage, China is currently developing a medium-high orbit quantum satellite, which is expected to be launched around 2026.”

That said, the limiting factor in all QKD systems to date is their ultimate reliance on a single photon to represent each qubit. Not even the most exquisitely-refined lasers and fiber optic lines can’t escape the vulnerability of individual photons.

QKD repeaters, which would blindly replicate a single photon’s quantum state but not leak any distinguishing information about the individual photons passing through—meaning the repeater would not be hackable by eavesdroppers—do not exist today. But, Finke says, such tech is achievable, though at least 5 to 10 years away. “It definitely is early days,” he says.

“While China likely holds an advantage in QKD-based cryptography due to its early investment and development, others are catching up.” —Ciel Qi, Rhodium Group

“In China they do have a 2,000-kilometer network,” Finke says. “But it uses this thing called trusted nodes. I think they have over 30 in the Beijing to Shanghai network. So maybe every 100 km, they have this unit which basically measures the signal... and then regenerates it. But the trusted node you have to locate on an army base or someplace like that. If someone breaks in there, they can hack into the communications.”

Meanwhile, India has been playing catch-up, according to Satyam Priyadarshy , a senior advisor to Global Quantum Intelligence. Priyadarshy says India’s National Quantum Mission includes plans for QKD communications research—aiming ultimately for QKD networks connecting cities over 2,000-km distances, as well as across similarly long-ranging satellite communications networks.

Priyadarshy points both to government QKD research efforts—including at the Indian Space Research Organization—and private enterprise-based R&D, including by the Bengaluru-based cybersecurity firm QuNu Labs . Priyadarshy says that QuNu, for example, has been working on a hub-and-spoke framework named ChaQra for QKD. ( Spectrum also sent requests for comment to officials at India’s Department of Telecommunications , which were unanswered as of press time.)

“A hybrid of QKD and PQC is the most likely solution for a quantum safe network.” —Satyam Priyadarshy, Global Quantum Intelligence

In the U.S. and European Union, similar early-stage efforts are also afoot. Contacted by IEEE Spectrum , officials from the European Telecommunications Standards Institute (ETSI); the International Standards Organization (ISO); the International Electrotechnical Commission (IEC); and the IEEE Communications Society confirmed initiatives and working groups that are now working to both promote QKD technologies and emergent standards now taking shape.

“While ETSI is fortunate to have experts in a broad range of relevant topics, there is a lot to do,” says Martin Ward , senior research scientist based at Toshiba’s Cambridge Research Laboratory in England, and chair of a QKD industry standards group at ETSI.

Multiple sources contacted for this article envisioned a probable future in which PQC will likely be the default standard for most secure communications in a world of pervasive quantum computing . Yet, PQC also cannot avoid its potential Achilles’ heel against increasingly powerful quantum algorithms and machines either. This is where, the sources suggest, QKD could offer the prospect of hybrid secure communications that PQC alone could never provide.

“QKD provides [theoretical] information security, while PQC enables scalab[ility],” Priyadarshy says. “A hybrid of QKD and PQC is the most likely solution for a quantum safe network.” But he added that efforts at investigating hybrid QKD-PQC technologies and standards today are “very limited.”

Then, says Finke, QKD could still have the final say, even in a world where PQC remains preeminent. Developing QKD technology just happens, he points out, to also provide the basis for a future quantum Internet.

“It’s very important to understand that QKD is actually just one use case for a full quantum network,” Finke says.

“There’s a lot of applications, like distributed quantum computing and quantum data centers and quantum sensor networks,” Finke adds. “So even the research that people are doing now in QKD is still very, very helpful because a lot of that same technology can be leveraged for some of these other use cases.”

  • Prepping For Post-Quantum Cryptography ›
  • China Demonstrates Quantum Encryption By Hosting a Video Call ›
  • NIST's Post-Quantum Cryptography Standards Are Here - IEEE Spectrum ›
  • Quantum Key Distribution | QKD | Quantum Cryptography - ID ... ›
  • Quantum key distribution - Wikipedia ›

Margo Anderson is senior associate editor and telecommunications editor at IEEE Spectrum . She has a bachelor’s degree in physics and a master’s degree in astrophysics.

Robert Moskowitz

This article misses an important point that QKD CANNOT provide digital signatures. At least is all current posted work. For this you need PQC. This a critical distinction.

Topology Makes On-Chip Terahertz Beamforming a Reality

"dark oxygen" muddies the waters for deep sea mining, nist announces post-quantum cryptography standards, related stories, prepping for post-quantum cryptography, open-source security chip released, meta’s global encryption rollout ups privacy stakes.

cryptography dissertation topics

Olympic Breakdancer Raygun Has PhD in Breakdancing?

Rachael gunn earned a zero in breakdancing at the paris 2024 olympic games., aleksandra wrona, published aug. 13, 2024.

Mixture

About this rating

Gunn's Ph.D. thesis, titled "Deterritorializing Gender in Sydney's Breakdancing Scene: a B-girl's Experience of B-boying," did cover the topic of breakdancing. However ...

... Gunn earned her Ph.D. in cultural studies. Moreover, a "PhD in breakdancing" does not exist as an academic discipline.

On Aug. 10, 2024, a rumor spread on social media that Rachael Gunn (also known as "Raygun"), an Australian breakdancer who competed in the 2024 Paris Olympics, had a Ph.D. in breakdancing. "This australian breakdancer has a PhD in breakdancing and dance culture and was a ballroom dancer before taking up breaking. I don't even know what to say," one X post on the topic read .

"Australian Olympic breakdancer Rachael Gunn has a PhD in breakdancing and dance culture," one X user wrote , while another asked, "Who did we send? Raygun, a 36-year-old full-time lecturer at Sydney's Macquarie University, completed a PhD in breaking culture and is a lecturer in media, creative arts, literature and language," another X user wrote .

The claim also spread on other social media platforms, such as Reddit and Instagram . 

"Is she the best break dancer? No. But I have so much respect for going on an international stage to do something you love even if you're not very skilled at it," one Instagram user commented , adding that, "And, I'm pretty sure she's using this as a research endeavor and will be writing about all our reactions to her performance. Can't wait to read it!"

In short, Gunn's Ph.D. thesis, titled "Deterritorializing Gender in Sydney's Breakdancing Scene: A B-girl's Experience of B-boying," indeed focused on the topic of breakdancing. However, Gunn earned her Ph.D. in cultural studies, not in breakdancing. Furthermore, it's important to note that a "PhD in breakdancing" does not exist as an academic discipline. 

Since Gunn's research focused on the breakdancing community, but her degree is actually in the broader field of cultural studies, we have rated this claim as a "Mixture" of truths.

Gunn "secured Australia's first ever Olympic spot in the B-Girl competition at Paris 2024 by winning the QMS Oceania Championships in Sydney, NSW, Australia," the Olympics official website informed . 

Gunn earned a zero in breakdancing at the Paris 2024 Olympic Games and clips of her routine went viral on social media, with numerous users creating memes or mocking dancer's moves. "As well as criticising her attire, social media users mocked the Australian's routine as she bounced around on stage like a kangaroo and stood on her head at times," BBC article on the topic read . 

The website of the Macquarie University informed Gunn "is an interdisciplinary and practice-based researcher interested in the cultural politics of breaking" and holds a Ph.D. in cultural studies, as well as a bachelor of arts degree (Hons) in contemporary music: 

Rachael Gunn is an interdisciplinary and practice-based researcher interested in the cultural politics of breaking. She holds a PhD in Cultural Studies (2017) and a BA (Hons) in Contemporary Music (2009) from Macquarie University. Her work draws on cultural theory, dance studies, popular music studies, media, and ethnography. Rachael is a practising breaker and goes by the name of 'Raygun'. She was the Australian Breaking Association top ranked bgirl in 2020 and 2021, and represented Australia at the World Breaking Championships in Paris in 2021, in Seoul in 2022, and in Leuven (Belgium) in 2023. She won the Oceania Breaking Championships in 2023.

Gunn's biography further revealed that she is a member of the Macquarie University Performance and Expertise Reasearch Centre, and has a range of teaching experience at undergraduate and postgraduate levels "across the areas of media, creative industries, music, dance, cultural studies, and work-integrated learning." 

Moreover, it informed her research interests included, "Breaking, street dance, and hip-hop culture; youth cultures/scenes; constructions of the dancing body; politics of gender and gender performance; ethnography; the methodological dynamics between theory and practice."

Gunn earned her Ph.D. from the Department of Media, Music, Communications, and Cultural Studies within the Faculty of Arts at Macquarie University. Below, you can find the abstract of her paper, shared by the official website of Macquarie University:

This thesis critically interrogates how masculinist practices of breakdancing offers a site for the transgression of gendered norms. Drawing on my own experiences as a female within the male-dominated breakdancing scene in Sydney, first as a spectator, then as an active crew member, this thesis questions why so few female participants engage in this creative space, and how breakdancing might be the space to displace and deterritorialise gender. I use analytic autoetthnography and interviews with scene members in collaboration with theoretical frameworks offered by Deleuze and Guttari, Butler, Bourdieu and other feminist and post-structuralist philosophers, to critically examine how the capacities of bodies are constituted and shaped in Sydney's breakdancing scene, and to also locate the potentiality for moments of transgression. In other words, I conceptualize the breaking body as not a 'body' constituted through regulations and assumptions, but as an assemblage open to new rhizomatic connections. Breaking is a space that embraces difference, whereby the rituals of the dance not only augment its capacity to deterritorialize the body, but also facilitate new possibilities for performativities beyond the confines of dominant modes of thought and normative gender construction. Consequently, this thesis attempts to contribute to what I perceive as a significant gap in scholarship on hip-hop, breakdancing, and autoethnographic explorations of Deleuze-Guattarian theory.

In a response to online criticism of her Olympics performance, Gunn wrote on her Instagram profile: "Don't be afraid to be different, go out there and represent yourself, you never know where that's gonna take you":

We have recently investigated other 2024 Paris Olympics' -related rumors, such as:

  • Lifeguards Are Present at Olympic Swimming Competitions?
  • Hobby Lobby Pulled $50M in Ads from 2024 Paris Olympics?
  • 2024 Paris Olympics Are 'Lowest-Rated' Games in Modern History?

Gunn, Rachael Louise. Deterritorializing Gender in Sydney's Breakdancing Scene: A B-Girl's Experience of B-Boying. 2022. Macquarie University, thesis. figshare.mq.edu.au, https://doi.org/10.25949/19433291.v1.

---. Deterritorializing Gender in Sydney's Breakdancing Scene: A B-Girl's Experience of B-Boying. 2022. Macquarie University, thesis. figshare.mq.edu.au, https://doi.org/10.25949/19433291.v1.

Ibrahim, Nur. "Lifeguards Are Present at Olympic Swimming Competitions?" Snopes, 8 Aug. 2024, https://www.snopes.com//fact-check/lifeguards-paris-olympics-swimming/.

"Olympic Breaking: Criticism of Viral Breakdancer Rachael Gunn - Raygun - Condemned by Australia Team." BBC Sport, 10 Aug. 2024, https://www.bbc.com/sport/olympics/articles/c2dgxp5n3rlo.

ORCID. https://orcid.org/0000-0002-1069-4021. Accessed 12 Aug. 2024.

Paris 2024. https://olympics.com/en/paris-2024/athlete/-raygun_1940107. Accessed 12 Aug. 2024.

Saunders, Grant Leigh, and Rachael Gunn. "Australia." Global Hip Hop Studies, vol. 3, no. 1–2, Dec. 2023, pp. 23–32. Macquarie University, https://doi.org/10.1386/ghhs_00060_1.

Wazer, Caroline. "2024 Paris Olympics Are 'Lowest-Rated' Games in Modern History?" Snopes, 1 Aug. 2024, https://www.snopes.com//fact-check/paris-olympics-lowest-rated-games/.

---. "Hobby Lobby Pulled $50M in Ads from 2024 Paris Olympics?" Snopes, 8 Aug. 2024, https://www.snopes.com//fact-check/olympics-hobby-lobby-ads/.

By Aleksandra Wrona

Aleksandra Wrona is a reporting fellow for Snopes, based in the Warsaw, Poland, area.

Article Tags

'QUEEEEEN': Raygun of Olympics breakdancing fame spotted busting moves, gains fan in Adele

Rachael gunn, also known as raygun, was spotted breakdancing in front of cheering fans on the heels of the 36-year-old's newfound fame stemming from her performance at the 2024 paris games.

cryptography dissertation topics

Rachael Gunn , also known by her breakdancing name Raygun, went viral during the 2024 Paris Olympic Games , but the Australian is garnering even more attention after she was recently filmed busting a move or two in front of adulating fans.

Gunn is a 36-year-old university lecturer from Sydney who made waves with her performance at Place de la Concorde during the Paris Games' breakdancing competition. Many people online, and even Grammy-winning singer Adele, poked fun at Gunn's unique moves.

"I think it's the best thing that's happened in the Olympics the entire time," the British singer said about Gunn's dancing while on stage during a concert in Munich, Germany. "Did anyone see the breakdancing lady? Now I didn't even know that breakdancing was an Olympic sport these days. I think that's (expletive) fantastic."

Watch: Adele praises breakdancer Raygun during concert

Adele continued to say that she and her friends had been "laughing" for "nearly 24 hours" about Gunn's dancing, but she said it made her "very very happy."

Despite the jokes, Gunn continues to embrace the spotlight and some lucky fans even got a chance to see her breakdance in person. TikTok user @jeanmitchell posted a video of Gunn dancing in the street as fans surrounded her and yelled after each move. The caption was: "(Expletive) QUEEEEN"

@jeanmitchell_ FKN QUEEEEEN #RAYGUN #breaking #breakdancing #paris2024 ♬ original sound - Jeanos

How did Raygun do at the Paris Olympics?

Although Gunn is gaining fans, the Olympic judges were anything but as they didn't give the "B-girl" a single point throughout the competition. She was defeated by USA’s Logistx, France’s Syssy and Lithuania’s Nicka, losing 18-0 on each occasion.

Gunn, who wrote her PhD thesis on the intersection of gender and Sydney’s breaking culture, also repped Australia at the world championships in 2021 and 2022 before earning a spot at the Olympics through the Oceania championships in 2023, CNN reported.

"In 2023, many of my students didn’t believe me when I told them I was training to qualify for the Olympics and were shocked when they checked Google and saw that I qualified,”  Gunn told CNBC earlier this month .

While most of the 32 B-boys and B-girls at the Paris Games had been breakdance battling since they were young, Gunn did not participate in her first battle until 2012.

“All my moves are original,” Raygun told CNN after competing in Paris. “Creativity is really important to me. I go out there and I show my artistry. Sometimes, it speaks to the judges, and sometimes, it doesn’t. I do my thing and it represents art. That is what it is about.”

Duke University Libraries

HISTORY 495S/496S: Honors Thesis Seminar 2024/25

  • Topic: Page Act
  • Thesis Writers & Duke Libraries
  • Browse all Guides at Duke Libraries
  • Define Archival Materials and Primary Sources
  • Appreciate the "Finding Aid" for Archival Material
  • Search Across Finding Aid Portals
  • Organize and Cite Your Sources
  • Topic: The West and the Soviet Union
  • Topic: France Colonialism
  • Topic: NAZI Germany Persecution US Perceptions
  • Topic: US and Bosnia 1992–1995
  • Topic: Counter Culture and Black Power Movements
  • Topic: Canada and the American Civil War
  • Topic: Asante Female Power
  • Topic: Trinity College, Black Workers, and Durham
  • Topic: Cherokee Women, Property, Law, and Slavery
  • Sexual Assault in US. Army

Subject Librarians

Duke databases broadly related to the topic, archives and digital collections, secondary materials: books, secondary materials: articles.

  • Topic: Credit Lending and the Rise of Investment Banking
  • Topic: Child Welfare Legislation
  • Topic: Reagan to 9/11: Impacts on American Muslim Communities
  • Impact of Rabbinical Teachings on Israeli Settlers Violence 1967-1980

Matthew Hayes , Librarian for Asian American Studies, [email protected]

  • Asian American Studies

Kelley Lawton , Librarian for United States History, [email protected]

  • United States History

Start with a  Keywords  search, using words that describe your topic, and see what you find.

You might try different combinations of the following, as  Subject  searches:

  • America: History & Life This link opens in a new window Search for journal articles covering the history and culture of the United States and Canada, from prehistory to the present

Search a collection of important scholarly journals representing a range of disciplines.

  • Web of Science This link opens in a new window Search for articles from scholarly journals in all areas of research
  • << Previous: Sexual Assault in US. Army
  • Next: Topic: Credit Lending and the Rise of Investment Banking >>
  • Last Updated: Aug 14, 2024 5:16 PM
  • URL: https://guides.library.duke.edu/history_honors_thesis

Duke University Libraries

Services for...

  • Faculty & Instructors
  • Graduate Students
  • Undergraduate Students
  • International Students
  • Patrons with Disabilities

Twitter

  • Harmful Language Statement
  • Re-use & Attribution / Privacy
  • Support the Libraries

Creative Commons License

COMMENTS

  1. Theses

    Theses (Bachelor/Master) We offer thesis topics related to cryptography, IT security and Blockchain technologies. Our major areas of research are: Hardware cryptography: for example, designing new cryptographic primitives that are provably secure against side-channel attacks, analyzing existing countermeasures and benchmarking their efficiency.

  2. Cryptography and Information Security

    On the Theory and Design of Post-Quantum Authenticated Key-Exchange, Encryption and Signatures. Author: Delpech De Saint Guilhem, C. P. R., 21 Mar 2021. Supervisor: Smart, N. P. (Supervisor) & Warinschi, B. (Supervisor) Student thesis: Doctoral Thesis › Doctor of Philosophy (PhD) File.

  3. Master's Theses

    Available Projects. Students interested in a thesis with the group are kindly requested to send their transcript of records, along with a CV highlighting any relevant experience in cryptography, and either a preferred topic from the proposals below or a description of their interests within cryptography, to the contact noted under Student Projects. ...

  4. PDF Cryptographic Protocols: Theory and Implementation

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented in Chapter 2.

  5. PDF Quantum Cryptography

    1.1The beginnings of cryptography Cryptography is the science, at the crossroads of mathematics, physics, and computer science, that tends to design protocols to prevent malicious third-party from reading private messages. Even if the development of computers during the 20th century made the research in cryptography explode,

  6. (PDF) A Review Paper on Cryptography

    Cryptography has the importa nt purpose of providing reliabl e, strong, and robust network and data security. In this paper, we. demonstrated a review of some of the research that has been ...

  7. PDF A Study of Lightweight Cryptography a Thesis Submitted to The Graduate

    standardize lightweight algorithms. In this thesis, we first explain what lightweight cryptography is, along with its target devices and performance metrics and give two examples of lightweight algorithms, block cipher PRESENT and stream cipher TRIV-IUM. After that, we summarize the Lightweight Cryptography Project and give its timeline.

  8. Theses and papers

    1 - Cryptography: samples of publications PHD THESES. W. Beullens, The Design and Cryptanalysis of Post-Quantum Digital Signature Algorithms, PhD thesis, KU Leuven, 2021 C. Bootland, Efficiency and security aspects of lattice-based cryptography, PhD thesis, KU Leuven, 2021 C. Li, New Methods for Symmetric Cryptography, PhD thesis, KU Leuven, 2020 R. Zhang, Analyzing and Improving Proof-of-Work ...

  9. Cryptography Thesis Topics

    A simple definition of cryptography is the study of designing, developing, and testing secure communication techniques. These techniques are used to protect the transmission data from the sender point to the receiver point. Moreover, cryptography is a significant area of cybersecurity. Also, it is the study of complications of data patterns ...

  10. Dissertations / Theses: 'Cryptography'

    Consult the top 50 dissertations / theses for your research on the topic 'Cryptography.'. Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

  11. (PDF) Cryptography

    [email protected]. Ab stract—The wide use of cryptography is a necessary. consequence of the information revolution. With the existence of. electronic transmissions on computer ...

  12. 100 Cryptography Essay Topic Ideas & Examples

    100 Cryptography Essay Topic Ideas & Examples. Cryptography is a fascinating field that encompasses the study of secure communication techniques, encryption algorithms, and data protection methods. It plays a crucial role in today's digital world, ensuring the confidentiality, integrity, and authenticity of information.

  13. TOP 6 RESEARCH TOPICS IN CRYPTOGRAPHY

    Latest Research Topics in Cryptography. Lattice-based cryptanalysis using post-quantum based cryptography. Oblivious RAM and testable calculations using cloud computing methodologies. Highly secure processors like Intel SGX and cryptographic protocols such as TLS, Safe multiparty computing protocols, and SSL.

  14. 53 Cryptography Essay Topic Ideas & Examples

    The algorithm was adopted in the US in 2001 by the National Institute of Standards and Technology. The structure of RC5 is Fesitel-like network and has 1 to 255 rounds. The encryption key is kept public and is known as the "public key" while the decryption key is kept secret and is known as the "private or secret key".

  15. Topics in Cryptography

    Overview. CS 787 is a seminar-style course in which students will readand present papers on current research in Cryptography. Potential topicsinclude zero knowledge, concurrency and protocol security, database privacy,connections between symbolic and computational security analysis, andcryptographic game theory.

  16. Latest Research Topics in Cryptography and Network Security

    Detect the attack and analyze their effect on network after execution. Analyze the origin and root cause of the threats / attacks. Conduct in-depth inspection on different levels of attacks. Our development team is sophisticated with experienced developers, so we can solve any level of a complex issue.

  17. PDF Cryptography

    1 Historic ciphers 2 Perfect secrecy 3 Semantic security 4 Block ciphers 5 Modes of operation 6 Message authenticity 7 Authenticated encryption 8 Secure hash functions 9 Secure hash applications 10 Key distribution problem 11 Number theory and group theory 12 Discrete logarithm problem 13 RSA trapdoor permutation 14 Digital signatures 3 / 233

  18. KIT

    The research area of post-quantum cryptography deals with the analysis of these primitives, exploration of further quantum-resistant methods and their use in theory and practice. Our research. In the area of post-quantum cryptography, the first step is to build up a basic understanding of some underlying mathematical methods such as lattice ...

  19. Cryptography Research Topics Ideas

    Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. List of Research Topics and Ideas of Cryptography. 1. Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. 2.

  20. Latest 12+ Cryptography Topics for Project

    Fundamentals of Cryptographic Systems. The foregoing section revealed to you the fundamental aspects involved in cryptography. In addition to the above-mentioned phases, our technical team wanted to list out the diverse terminologies used in the cryptography systems for the ease of your understanding.

  21. Research Topic on Cryptography for master's thesis

    A research into new use cases for cryptographic protocols. I did my master thesis on board game and card game protocols done through cryptographic protocols. Study SNARK constructions and zero knowledge cryptography. Would make a good masters thesis and would also make you employable after you graduate. I wish I had done that for my masters ...

  22. Quantum Key Distribution Meets Post-Quantum Cryptography

    Quantum computers could decimate internet security, but two competing fields are developing solutions—and the ideal solution could be a mix of both

  23. Post-Quantum Cryptography Standards Officially Announced by NIST

    SecurityWeek speaks to Michael Osborne, CTO of IBM Quantum Safe, for a better understanding of the need for and principles of quantum safe cryptography. NIST has formally published three post-quantum cryptography standards from the competition it held to develop cryptography able to withstand the ...

  24. Topic: Child Welfare Legislation

    Start with a Keywords search, using words that describe your topic, and see what you find. You might try different combinations of the following, as Subject searches. You can also add in geographic terms, such as a state or city (in place of United States), date terminology, such as 20th century, and key terms, like history.

  25. Olympic Breakdancer Raygun Has PhD in Breakdancing?

    In short, Gunn's Ph.D. thesis, titled "Deterritorializing Gender in Sydney's Breakdancing Scene: A B-girl's Experience of B-boying," indeed focused on the topic of breakdancing.

  26. HISTORY 495S/496S: Honors Thesis Seminar 2024/25

    Topic: US and Bosnia 1992-1995; Topic: Counter Culture and Black Power Movements; Topic: Canada and the American Civil War; Topic: Asante Female Power; Topic: Trinity College, Black Workers, and Durham; Topic: Cherokee Women, Property, Law, and Slavery; Sexual Assault in US. Army. Subject Librarians; Duke. Databases Broadly related to this Topic

  27. LibGuides: HISTORY 495S/496S: Honors Thesis Seminar 2024/25: Topic

    Topic: US and Bosnia 1992-1995; Topic: Counter Culture and Black Power Movements; Topic: Canada and the American Civil War; Topic: Asante Female Power; Topic: Trinity College, Black Workers, and Durham; Topic: Cherokee Women, Property, Law, and Slavery; Sexual Assault in US. Army; Topic: Page Act; Topic: Credit Lending and the Rise of ...

  28. Raygun the viral Olympic breakdancer busts more moves; Adele is a fan

    Gunn, who wrote her PhD thesis on the intersection of gender and Sydney's breaking culture, also repped Australia at the world championships in 2021 and 2022 before earning a spot at the ...

  29. Topic: Page Act

    Topic: US and Bosnia 1992-1995; Topic: Counter Culture and Black Power Movements; Topic: Canada and the American Civil War; Topic: Asante Female Power; Topic: Trinity College, Black Workers, and Durham; Topic: Cherokee Women, Property, Law, and Slavery; Sexual Assault in US. Army; Topic: Page Act. Subject Librarians; Duke Databases Broadly ...

  30. Libraries to Offer Three Free EndNote Web Virtual Instruction Sessions

    Use saved references to "Cite While You Write" and produce a formatted term paper, thesis or dissertation. SESSIONS. The first session will be held from 2:30-3:20 p.m. Friday, Aug. 16; The second session from 10:45-11:35 a.m. Monday, Aug. 19; and. The third session from 11:50 a.m. to 12:40 p.m. Tuesday, Aug. 20.