A Literature Review on the Role of Mathematics in Enhancing Cyber Security Through Data Encryption
##plugins.themes.academic_pro.article.main##
Abstract
This article discusses the important role of mathematics in enhancing cyber security in the data encryption process. The research problem investigates the benefits of applying mathematical principles in maintaining data security amid increasingly complex cyber threats. The study focuses on four main criteria: protecting sensitive information, verifying user identity, preventing intrusions, and protecting network integrity. Mathematical algorithms, binary numbers, and boolean algebra are essential in effectively encrypting data. They not only protect sensitive information from unauthorized access but also verify user authenticity, preventing identity theft and unauthorized system access. By utilizing mathematical theories and algorithms, binary numbers, and boolean algebra, cyber security systems can guarantee data confidentiality, integrity, and availability. In conclusion, the integration of mathematics in cyber security systems is essential to mitigate risks and protect critical digital assets from increasingly sophisticated cyber threats.
##plugins.themes.academic_pro.article.details##

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
- Bowcut, S. (2024, March 7). Why Math Matters in Cybersecurity. Cybersecurity Guide. Retrieved April 30, 2024.
- Johanna Ullrich, Jordan Cropper, Peter Fruhwirt, & Edgar Weippl. (n.d.). How Is Math Used in Cybersecurity? edX. Retrieved April 30, 2024.
- Koziuk, Y. (2023, June 26). (PDF) APPLICATION OF MATHEMATICS IN CYBER SECURITY. ResearchGate. Retrieved April 30, 2024.
- Ozgur Depren, Murat Topallar, Emin Anarim, & Ciliz, M. K. (2005). An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks, 29.
- William Stallings. 2017. Cryptography and Network Security: Principles and Practice
- Ariandi, W., Widyastuti, S. & Haris, L., 2020. Implementation of Block Cipher Electronic Codebook (ECB) for Employee Data Security. Jurnal Ilmiah Intech: Information Technology Journal of UMUS, pp. 67-68.
- Bergen, B., 2020. Analisis Penerapan Aljabar Boolean dalam Kriptografi pada Masa Perang Dunia II.
- Pratama, A., Arif, M.N., Nazir, M., Dannaun, Z. & Dara, 2023. Algoritma DES (Data Encryption Standard) untuk Keamanan Digital. Jurnal SITEBA, 2(1), pp. 15-26.
- Sulastri, S. & Putri, R.D.M., 2018. Implementasi Enkripsi Data Secure Has Algorithm (SHA - 256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan. Jurnal Teknik Elektro, 10(2), pp. 71-73.
- Jonathan Katz and Yehuda Lindell. Introduction to Cryptography, Modern Second Edition. University Maryland, College Park, 2010.
- Amoroso, E. 2006. Cyber Security. New Jersey: Silicon Press
- Lewis, J. A. 2006. Cybersecurity and Critical Infrastructure Protection. Washington, DC: Center for Strategic and International Studies.
- Boneh, D., & Silverberg, A. (2019). A Cryptographic System Based on Elliptic Curves and Modular Forms. Journal of Mathematical Cryptology, 13(1), 1-23.
- Stevens, M., Bursztein, E., Karpman, P., Albertini, A., & Markov, Y. (2017). The first collision for full SHA-1. In Advances in Cryptology (pp. 570–596).