Secure voice cryptography based on Diffie-Hellman algorithm
نویسندگان
چکیده
منابع مشابه
Secure Bilinear Diffie-Hellman Bits
The Weil and Tate pairings are a popular new gadget in cryptography and have found many applications, including identity-based cryptography. In particular, the pairings have been used for key exchange protocols. This paper studies the bit security of keys obtained using protocols based on pairings (that is, we show that obtaining certain bits of the common key is as hard as computing the entire...
متن کاملDeniable Authentication Protocol based on Bilinear Diffie - Hellman Algorithm
This paper describes a new deniable authentication protocol whose security is based Diffe-Hellman (CDH) Problem of type Decisional Diffie-Hellman(DDH) and the Hash DiffieHellman (HDDH) problem.This protocol can be implemented in low power and small processor mobile devices such as smart card, PDA etc which work in low power and small processor. A deniable authentication protocol enables a recei...
متن کاملA New Diffie-Hellman Algorithm based on Bidirectional Chaotic Systems
The aim of this paper is to development a very strong cryptographic systems using hyperelliptic Curves and Complete Synchronization for a Bidirectional Chaotic systems based on Lorenz attractor. Also performance simulations of SISO and MIMO systems over fading channels produce a benefit of 16dB for BER=10e−6 once the wireless channel is ensured. Key-Words:Diffie-Hellman Key Exchange, -Public Ke...
متن کاملCircular-Secure Encryption from Decision Diffie-Hellman
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a “key cycle” usage, where we have a cycle of public/secret key-pairs (pki, ski) for i = 1, . . . , n, and we encrypt each ski under pk(i mod n)+1. Such usage scenarios sometimes arise in key-management systems and in the context o...
متن کاملA secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm
This paper describes a new deniable authentication protocol whose security is based Diffe-Hellman (CDH) Problem of type Decisional Diffie-Hellman(DDH) and the Hash Diffie-Hellman (HDDH) problem.This protocol can be implemented in low power and small processor mobile devices such as smart card, PDA etc which work in low power and small processor. A deniable authentication protocol enables a rece...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Materials Science and Engineering
سال: 2021
ISSN: 1757-8981,1757-899X
DOI: 10.1088/1757-899x/1076/1/012057