ACE: The Advanced Cryptographic Engine
نویسندگان
چکیده
This document describes the Advanced Cryptographic Engine (ACE ). It specifies a public key encryption scheme as well as a digital signature scheme with enough detail to ensure interoperability between different implementations. These schemes are almost as efficient as commercially used schemes, yet unlike such schemes, can be proven secure under reasonable and well-defined intractability assumptions. A concrete security analysis of both schemes is presented.
منابع مشابه
ACE Encrypt : The Advanced Cryptographic Engine ’ s Public Key Encryption Scheme ∗
This document describes the part of the Advanced Cryptographic Engine (ACE ) pertaining to public key encryption. It specifies a public key encryption scheme with enough detail to ensure interoperability between different implementations. This scheme is almost as efficient as commercially used schemes, yet unlike such schemes, can be proven secure under reasonable and well-defined intractabilit...
متن کاملAn Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectures have to be flexible enough to adapt to diverse security parameters. This paper proposes an FPGAbased Adaptive Cryptographic Engine (ACE) for IPSec architectures. By taking advantage of FPGA technology, ACE can adap...
متن کاملA Comparative Analysis of Hybrid Encryption Schemes Based on Elliptic Curves
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures, and performing key exchanges. Regarding the encryption capability, the first schemes that appeared were either versions of already existing public-key algorithms (Massey-Omura and ElGamal) or new schemes specified ad hoc (MenezesVanstone). However, all the initial elliptic curve encryption ...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملAccess Control Encryption: Enforcing Information Flow with Cryptography
We initiate the study of Access Control Encryption (ACE), a novel cryptographic primitive that allows fine-grained access control, by giving different rights to different users not only in terms of which messages they are allowed to receive, but also which messages they are allowed to send. Classical examples of security policies for information flow are the well known Bell-Lapadula [BL73] or B...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2000 شماره
صفحات -
تاریخ انتشار 2000