Founded in 2014, the Cryptology Research Group (CRG) at Department of Information Security, Military College of Signals, Rawalpindi carries out research in the areas of cryptography, cryptanalysis, security, and privacy.

Welcome to Cryptology Research Group

The Cryptology Research Group (CRG) comprises of six academics supported by a number of masters and doctoral students. The research and developmental work at the group is largely focused on design, sildenafil citrate comprar development, analysis and evaluation of secure and efficient cryptographic protocols. Vision​ To become a nationally and internationally renowned research group in Cryptology. […]



Symmetric Key Cryptography


Symmetric Key Cryptography refers to encryption methods in which both the sender and receiver share the same key.  This was the only kind of encryption publicly known until June 1976. Since then other schemes have also emerged on the scene, however, Symmetric Key Cryptography is still one of the most well researched area of […]


Public Key Cryptography

Information Security

Symmetric-key cryptosystems order levitra generic use the same key for encryption and decryption of a message, though a message or group of messages may have a different key than others. A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. Each distinct pair of communicating parties must, ideally, share a different […]




The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion. There are a wide variety of cryptanalytic attacks, and they can be classified in any of several ways. A common distinction turns on what an attacker knows and what capabilities are available. In […]


Cryptographic Hash Functions

image-InformationSecurity A cryptographic hash function is a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone. The input data is often called the message, and the hash value is often called the message digest or simply the digest. The ideal cryptographic hash function has four main properties: it is easy to […]


Quantum Cryptography


Quantum cryptography describes the acheter cialis en ligne use acheter viagra of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems. Well-known examples of quantum cryptography are the use of quantum communication to exchange a key securely (quantum key distribution) and the hypothetical use of quantum computers that would allow the breaking of […]


Zero Knowledge Proofs


A protocol between two parties Alice and Bob is zero-knowledge (from Alice’s point of view), if it does not leak any information to Bob. Zero-knowledge is a viagra naturel maca fundamental notion in cryptography and has important applications. For example, Alice can prove to Bob that she knows a secret key corresponding to a […]