Secure Encryption Technique ( SET ) : A Private Key Crypto System

نویسنده

  • Rajdeep Chakraborty
چکیده

The Secure Encryption Technique (SET) is a Private Key Block Cipher Cryptosystem which has been modified on the platform of Triple SV. This cryptosystem inherits its basic architecture and function from TSV and then it has been developed further to provide better security with the ease of use for even the basic requirements of encryption system. The key is a 2 bit (128 bit) key and the encryption is based completely on the key provided [1].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys

We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. In our first construction both ciphertexts and private keys are of constant size (only two group elements), for any subset of receivers. The public key size in this system is linear in the total number of receivers. Our second system is a generaliza...

متن کامل

Fully, (Almost) Tightly Secure IBE and Dual System Groups

We present the first fully secure Identity-Based Encryption scheme (IBE) from the standard assumptions where the security loss depends only on the security parameter and is independent of the number of secret key queries. This partially answers an open problem posed by Waters (Eurocrypt 2005). Our construction combines the Waters’ dual system encryption methodology (Crypto 2009) with the Naor-R...

متن کامل

Identity Based Encryption through Elliptical Curve Cryptography

Although the Boneh and Franklin identity-based encryption scheme is not overly complex theoretically, the implementation of the system proves to be somewhat difficult. 1 Identity Based Encryption: The difficulty with public key encryption involves distribution of the keys and the assumption that they will always be available (Ding 194). It is not always practical to be connected to a key certif...

متن کامل

Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions

We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption (IBE) and Hierarchical Identity-Based Encryption (HIBE) systems under the simple and established decisional Bilinear Diffie-Hellman and decisional Linear assumptions. Our IBE system has ciphertexts, private keys, and p...

متن کامل

Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification

We present high performance non-deterministic fully-homomorphic methods for practical randomization of data (over commutative ring), and symmetric-key encryption of random modN data over ring ZN well suited for crypto applications. These methods secure, for example, the multivariate input or the coefficients of a polynomial function running in an open untrusted environment. We show that random ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015