Introduction

Founded in 2014, the Cryptology Research Group (CRG) at Department of Information Security, Military College of Signals, Rawalpindi carries out research in the areas of cryptography, cryptanalysis, security, and privacy.

Welcome to Cryptology Research Group

The Cryptology Research Group (CRG) comprises of six academics supported by a number of masters and doctoral students. http://www.viagragenericoes24.com/female-viagra The research and developmental work at the group is largely focused on design, sildenafil citrate comprar development, analysis http://www.viagragenericoes24.com/viagra-para-hombres-precio and evaluation of secure and efficient cryptographic https://www.acheterviagrafr24.com/achat-viagra-cialis-en-ligne/ protocols. Vision​ To become a nationally and internationally renowned research group in Cryptology. […]

Read More...

Focus

Public Key Cryptography

Information Security

Symmetric-key cryptosystems order levitra generic use the same key http://www.laviagraes.com/cerati-viagra-cocaina for encryption and decryption of a message, though a message or group of messages may have a different key than others. A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. Each distinct pair of communicating parties must, ideally, share a different […]

Read More...

Cryptographic Hash Functions

image-InformationSecurity

https://www.acheterviagrafr24.com/viagra-definition/ A cryptographic hash function is a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone. The input data is often called https://www.acheterviagrafr24.com/viagra-100mg/ the message, and the hash value is often called the message digest or simply the digest. The ideal cryptographic hash function has four main properties: it is easy to […]

Read More...

Zero Knowledge Proofs

Information-Security

A protocol between two parties Alice and Bob is zero-knowledge (from Alice’s point of view), if it does not leak any information to Bob. Zero-knowledge is a viagra naturel maca fundamental https://www.acheterviagrafr24.com/viagra-prix-en-pharmacie/ notion in cryptography and has important applications. For example, Alice can prove to Bob that she knows a secret key corresponding to a […]

Read More...