{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T23:10:21Z","timestamp":1762297821401,"version":"3.41.2"},"reference-count":11,"publisher":"Emerald","issue":"9\/10","license":[{"start":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T00:00:00Z","timestamp":1318896000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10,18]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper seeks to advance research and strategies that lead to a heightened awareness of the need to protect data from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network\u2010based attacks.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper introduces the necessary mathematics of cryptography: integer and modular arithmetic, linear congruence, Euclidean and extended Euclidean algorithm, Fermat's theorem, and Elliptic curve.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The results indicate that encryption has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender\/receiver identity authentication, digital signatures, interactive proofs, and secure computation.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The results of this research show that all forms of e\u2010commerce activities such as online credit card processing, purchasing stocks, and banking data processing, if compromised, would lead to businesses losing billions of dollars in lost revenues as well as losing confidence in e\u2010commerce. In the last few years, it had been reported that organizations that store and maintain customers' private and confidential records were compromised on many occasions by hackers breaking into the data networks and stealing the records from the storage media.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper tackles one of the most critical problems of securing data networks. Security problems arise among other things to resource and workload sharing; complexity of interconnected networks; authentication of users; fast expandability of networks; threats to networks such as wiretapping and violations of the seven pillars of security: authentication, authorization, privacy, integrity, non\u2010repudiation, availability, and audit.<\/jats:p><\/jats:sec>","DOI":"10.1108\/03684921111169468","type":"journal-article","created":{"date-parts":[[2011,11,19]],"date-time":"2011-11-19T07:15:13Z","timestamp":1321686913000},"page":"1422-1439","source":"Crossref","is-referenced-by-count":8,"title":["Cryptography"],"prefix":"10.1108","volume":"40","author":[{"given":"Bhushan","family":"Kapoor","sequence":"first","affiliation":[]},{"given":"Pramod","family":"Pandya","sequence":"additional","affiliation":[]},{"given":"Joseph S.","family":"Sherif","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"doi-asserted-by":"crossref","unstructured":"Anazi, B. (2005), \u201cRevisiting public key cryptography\u201d, Computer, Vol. 38 No. 11, pp. 103\u20105.","key":"key2022021420271377700_b1","DOI":"10.1109\/MC.2005.388"},{"doi-asserted-by":"crossref","unstructured":"Balfanz, D. (2004), \u201cIn search of usable security: five lessons from the field\u201d, IEEE Security and Privacy, Vol. 2 No. 5, pp. 19\u201024.","key":"key2022021420271377700_b2","DOI":"10.1109\/MSP.2004.71"},{"unstructured":"Barr, T. (2002), Invitation to Cryptology, Prentice\u2010Hall, New York, NY.","key":"key2022021420271377700_b3"},{"doi-asserted-by":"crossref","unstructured":"Elliot, C. (2004), \u201cQuantum cryptography\u201d, IEEE Security and Privacy, Vol. 2 No. 4, pp. 57\u201061.","key":"key2022021420271377700_b4","DOI":"10.1109\/MSP.2004.54"},{"unstructured":"Forouzan, B. (2008), Cryptography and Network Security, McGraw\u2010Hill, New York, NY.","key":"key2022021420271377700_b5"},{"unstructured":"ICCC (2010), FBI Report, Internet Crime Complaint Center, Peoria, IL.","key":"key2022021420271377700_b6"},{"unstructured":"Mao, M. (2004), Modern Cryptography, Theory & Practice, Prentice\u2010Hall, New York, NY.","key":"key2022021420271377700_b7"},{"doi-asserted-by":"crossref","unstructured":"Pfleeger, C. and Pfleeger, S. (2007), Security in Computing, 4th ed., Pearson, New York, NY.","key":"key2022021420271377700_b8","DOI":"10.1109\/MSP.2006.111"},{"unstructured":"Stallings, W. (2003), Cryptography and Network Security, Prentice\u2010Hall, New York, NJ.","key":"key2022021420271377700_b10"},{"unstructured":"Stallings, W. and Brown, L. (2008), Computer Security, Prentice\u2010Hall, New York, NJ.","key":"key2022021420271377700_b9"},{"doi-asserted-by":"crossref","unstructured":"Tipton, H. and Krause, M. (2004), Information Security Management Handbook, Auerbach, New York, NY.","key":"key2022021420271377700_b11","DOI":"10.1201\/noe0849385858"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/03684921111169468","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684921111169468\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684921111169468\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:27:24Z","timestamp":1753399644000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/40\/9-10\/1422-1439\/445461"}},"subtitle":["A security pillar of privacy, integrity and authenticity of data communication"],"short-title":[],"issued":{"date-parts":[[2011,10,18]]},"references-count":11,"journal-issue":{"issue":"9\/10","published-print":{"date-parts":[[2011,10,18]]}},"alternative-id":["10.1108\/03684921111169468"],"URL":"https:\/\/doi.org\/10.1108\/03684921111169468","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2011,10,18]]}}}