Introduction

Founded in 2014, the Cryptology Research Group (CRG) at Department of Information Security, Military College of Signals, Rawalpindi carries out research in the areas of cryptography, cryptanalysis, security, and privacy.

Welcome to Cryptology Research Group

The Cryptology Research Group (CRG) comprises of six academics supported by a number of masters and doctoral students. http://www.viagragenericoes24.com/female-viagra The research and developmental work at the group is largely focused on design, sildenafil citrate comprar development, analysis http://www.viagragenericoes24.com/viagra-para-hombres-precio and evaluation of secure and efficient cryptographic https://www.acheterviagrafr24.com/achat-viagra-cialis-en-ligne/ protocols. Vision​ To become a nationally and internationally renowned research group in Cryptology. […]

Read More...

Focus

Symmetric Key Cryptography

comprehensive-security

Symmetric Key Cryptography refers http://www.cialispharmaciefr24.com/tadalafil-vasodilator/ to encryption methods in which both the sender and receiver share the same key.  This was the only kind of encryption publicly known until June 1976. Since then other schemes have also emerged on the scene, however, Symmetric Key Cryptography is still one of the most well researched area of […]

Read More...

Public Key Cryptography

Information Security

Symmetric-key cryptosystems order levitra generic use the same key http://www.laviagraes.com/cerati-viagra-cocaina for encryption and decryption of a message, though a message or group of messages may have a different key than others. A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. Each distinct pair of communicating parties must, ideally, share a different […]

Read More...

Cryptanalysis

crypto

The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion. There are a wide variety of cryptanalytic attacks, and they can be classified in https://www.acheterviagrafr24.com/viagra-pas-cher-en-france/ any of several ways. A common distinction turns on what an attacker knows and what capabilities are available. In […]

Read More...

Cryptographic Hash Functions

image-InformationSecurity

https://www.acheterviagrafr24.com/viagra-definition/ A cryptographic hash function is a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone. The input data is often called https://www.acheterviagrafr24.com/viagra-100mg/ the message, and the hash value is often called the message digest or simply the digest. The ideal cryptographic hash function has four main properties: it is easy to […]

Read More...

Quantum Cryptography

Info-Security

Quantum cryptography describes the acheter cialis en ligne use acheter viagra of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems. Well-known examples of quantum cryptography are the use of quantum communication to exchange a key securely (quantum key distribution) and the hypothetical use of quantum computers that would allow the breaking of […]

Read More...

Zero Knowledge Proofs

Information-Security

A protocol between two parties Alice and Bob is zero-knowledge (from Alice’s point of view), if it does not leak any information to Bob. Zero-knowledge is a viagra naturel maca fundamental https://www.acheterviagrafr24.com/viagra-prix-en-pharmacie/ notion in cryptography and has important applications. For example, Alice can prove to Bob that she knows a secret key corresponding to a […]

Read More...