Founded in 2014, the Cryptology Research Group (CRG) at Department of Information Security, Military College of Signals, Rawalpindi carries out research in the areas of cryptography, cryptanalysis, security, and privacy.

Welcome to Cryptology Research Group

The Cryptology Research Group (CRG) comprises of six academics supported by a number of masters and doctoral students. The research and developmental work at the group is largely focused on design, sildenafil citrate comprar development, analysis and evaluation of secure and efficient cryptographic protocols. Vision​ To become a nationally and internationally renowned research group in Cryptology. […]



Public Key Cryptography

Information Security

Symmetric-key cryptosystems order levitra generic use the same key for encryption and decryption of a message, though a message or group of messages may have a different key than others. A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. Each distinct pair of communicating parties must, ideally, share a different […]


Cryptographic Hash Functions

image-InformationSecurity A cryptographic hash function is a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone. The input data is often called the message, and the hash value is often called the message digest or simply the digest. The ideal cryptographic hash function has four main properties: it is easy to […]


Zero Knowledge Proofs


A protocol between two parties Alice and Bob is zero-knowledge (from Alice’s point of view), if it does not leak any information to Bob. Zero-knowledge is a viagra naturel maca fundamental notion in cryptography and has important applications. For example, Alice can prove to Bob that she knows a secret key corresponding to a […]