منابع مشابه
Chaos-Based Symmetric Key Cryptosystems
Chaos theory is the study of dynamical systems that are highly sensitive to initial conditions and exhibit seemingly random behavior. From the perspective of cryptography and information security, randomness generated from entirely deterministic systems is a very appealing property. As such, the application of chaos in modern cryptography has been a topic of much research and debate for over a ...
متن کاملSymmetric Cryptosystems and Symmetric Key Management
Since the earliest days of necessity for secret transmission of messages, which date back to thousands years BCE, different methods have been used to transfer the message between two parties. These days, systematic ways for transmitting secret information are used, and the fear of cracking the message is increasing with the development of breaking algorithms for different encryption techniques....
متن کاملComparison of two Public Key Cryptosystems
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...
متن کاملKey-Insulated Public Key Cryptosystems
Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by secret-key exposures. In our model, the secret k...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE ESS Fundamentals Review
سال: 2016
ISSN: 1882-0875
DOI: 10.1587/essfr.10.1_23