Subtopic Deep Dive
Cryptography
Research Guide
What is Cryptography?
Cryptography is the practice and study of techniques for secure communication in the presence of adversarial behavior, encompassing symmetric and asymmetric encryption, hash functions, digital signatures, and post-quantum schemes.
Cryptography secures data through algorithms like AES, RSA, and ElGamal, often combined with steganography for enhanced protection. Key papers include Muttaqin and Rahmadoni (2020) on AES file security (54 citations) and Adeniyi et al. (2022) on RSA-ElGamal with hashing (49 citations). Over 300 papers from the provided lists focus on implementations and performance analyses since 2006.
Why It Matters
Cryptography protects sensitive data in electronic transmission, as shown in Khairul Muttaqin and Jefril Rahmadoni (2020) applying AES to file systems against unauthorized access. Adeniyi et al. (2022) demonstrate RSA and ElGamal securing shared data amid rising connected devices, preventing credential theft. These methods enable secure AI data processing and networked cybersecurity, with Rachmawanto et al. (2017) combining LSB-AES for robust image-based transmission.
Key Research Challenges
Side-Channel Attack Resistance
Cryptosystems face vulnerabilities from timing and power analysis leaks. Singh and Attri (2015) highlight dual-layer AES-LSB needs for countering such attacks in steganography. Improved hardware countermeasures remain critical.
Post-Quantum Security
Quantum computing threatens RSA and ECC-based schemes. Foundational AES Rijndael by Surian (2006) endures, but lattice-based alternatives require validation. Adeniyi et al. (2022) note ongoing needs for quantum-resistant hybrids.
Computational Performance
Encryption overhead impacts video and large-file processing. Adeniyi et al. (2022) analyze modified Blowfish complexity on video data. Balancing security and speed persists in real-time applications.
Essential Papers
Analysis And Design of File Security System AES (Advanced Encryption Standard) Cryptography Based
Khairul Muttaqin, Jefril Rahmadoni · 2020 · Journal of Applied Engineering and Technological Science (JAETS) · 54 citations
The times has made human needs are increasing, including information needs. Therefore, sending and storing data through electronic media requires a process that is able to guarantee the security an...
Implementasi Penyembunyian Pesan Pada Citra Digital Dengan Menggabungkan Algoritma Hill Cipher Dan Metode Least Significant Bit (LSB)
Jane Irma Sari, Sulindawaty M.Kom, Hengki Tamando Sihotang · 2017 · Jurnal Mantik Penusa · 49 citations
The rapid development of technology in the current era, hiding undisclosed messages from irresponsible people or who can access the message required a way to hide the message. One way of concealmen...
Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions
Abidemi Emmanuel Adeniyi, Peace Busola Falola, Mashael Maashi et al. · 2022 · Information · 49 citations
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to ...
Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard
Fresly Nandar Pabokory, Indah Fitri Astuti, Awang Harsa Kridalaksana · 2016 · Informatika Mulawarman Jurnal Ilmiah Ilmu Komputer · 48 citations
Perkembangan teknologi terutama pada sistem pengamanan data dalam menjaga keamanan data informasi telah berkembang pesat. Dalam menjaga keamanan data informasi terdapat cabang ilmu dalam pengembang...
A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size
Eko Hari Rachmawanto, Rofi' Syaiful Amin, De Rosal Ignatius Moses Setiadi et al. · 2017 · 38 citations
Many people have used the internet in daily communication. The rise of internet data theft makes the security of data transmission becomes very important. Cryptography and Steganography is a techni...
Design and Implementation of Rivest Shamir Adleman’s (RSA) Cryptography Algorithm in Text File Data Security
Hengki Tamando Sihotang, Syahril Efendi, Elvyawati M Zamzami et al. · 2020 · Journal of Physics Conference Series · 36 citations
Abstract Security of data text file on a computer can be done by utilizing encryption and decryption techniques. One technique is encryption and decryption of data encryption system text file with ...
Enhanced pixel value differencing steganography with government standard algorithm
Heri Nurdiyanto, Robbi Rahim, Saiful Nurarif et al. · 2017 · 32 citations
Currently, data security is crucial so as not to fall into the hands of irresponsible, steganography and cryptography is a technique commonly used to secure information from irresponsible parties b...
Reading Guide
Foundational Papers
Start with Surian (2006) on AES Rijndael for symmetric basics (13 cites), then Efrandi et al. (2014) Vigenere for classical ciphers, and Sukirman et al. (2014) Henon for chaotic image encryption.
Recent Advances
Study Adeniyi et al. (2022) on RSA-ElGamal hashing and Blowfish video analysis (49+24 cites), plus Rachmawanto et al. (2017) LSB-AES stego (38 cites).
Core Methods
Core techniques: AES block cipher (Muttaqin 2020), RSA public-key (Sihotang 2020), LSB steganography (Sari 2017), ElGamal with MD5 (Adeniyi 2022).
How PapersFlow Helps You Research Cryptography
Discover & Search
Research Agent uses searchPapers and exaSearch to find AES implementations like Khairul Muttaqin and Jefril Rahmadoni (2020), then citationGraph reveals 54 citing works on file security, while findSimilarPapers uncovers RSA variants from Adeniyi et al. (2022).
Analyze & Verify
Analysis Agent applies readPaperContent to extract AES key schedules from Muttaqin and Rahmadoni (2020), verifies claims with CoVe chain-of-verification, and runs PythonAnalysis to compute encryption timings using NumPy, graded by GRADE for statistical rigor.
Synthesize & Write
Synthesis Agent detects gaps in post-quantum RSA coverage across papers, flags contradictions in performance claims, then Writing Agent uses latexEditText, latexSyncCitations for 10+ papers, and latexCompile to produce a secure scheme review document.
Use Cases
"Benchmark AES vs RSA encryption speed on text files"
Research Agent → searchPapers(AES RSA text) → Analysis Agent → runPythonAnalysis(NumPy timing sim on Muttaqin 2020 pseudocode) → matplotlib plot of throughput metrics.
"Generate LaTeX report on stego-crypto hybrids"
Synthesis Agent → gap detection(Rachmawanto 2017 + Singh 2015) → Writing Agent → latexEditText(intro), latexSyncCitations(8 papers), latexCompile → PDF with security proof diagrams.
"Find GitHub repos implementing Hill Cipher LSB from papers"
Research Agent → paperExtractUrls(Sari 2017) → Code Discovery → paperFindGithubRepo → githubRepoInspect(code quality, tests) → verified steganography demo.
Automated Workflows
Deep Research workflow scans 50+ cryptography papers via searchPapers, structures AES-RSA comparisons into reports with GRADE grading. DeepScan applies 7-step CoVe to verify Adeniyi et al. (2022) claims against implementations. Theorizer generates novel hybrid schemes from Surian (2006) AES and post-quantum gaps.
Frequently Asked Questions
What defines cryptography?
Cryptography secures communication via encryption techniques like AES and RSA against adversaries, including proofs and side-channel defenses.
What are common methods?
Methods include symmetric AES (Muttaqin 2020), asymmetric RSA-ElGamal (Adeniyi 2022), and steganography hybrids like LSB-AES (Rachmawanto 2017).
What are key papers?
Top papers: Muttaqin and Rahmadoni (2020, AES, 54 cites), Sari et al. (2017, Hill-LSB, 49 cites), Adeniyi et al. (2022, RSA-ElGamal, 49 cites).
What open problems exist?
Challenges include quantum-resistant upgrades beyond RSA, side-channel hardening (Singh 2015), and low-overhead video encryption (Adeniyi 2022).
Research Computer Science and Engineering with AI
PapersFlow provides specialized AI tools for Computer Science researchers. Here are the most relevant for this topic:
AI Literature Review
Automate paper discovery and synthesis across 474M+ papers
Code & Data Discovery
Find datasets, code repositories, and computational tools
Deep Research Reports
Multi-source evidence synthesis with counter-evidence
AI Academic Writing
Write research papers with AI assistance and LaTeX support
See how researchers in Computer Science & AI use PapersFlow
Field-specific workflows, example queries, and use cases.
Start Researching Cryptography with AI
Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.
See how PapersFlow works for Computer Science researchers
Part of the Computer Science and Engineering Research Guide