2 Public-key Cryptography
نویسنده
چکیده
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996). The message that is sent by the sender is called the plaintext, the secured message is called the ciphertext. To get the ciphertext, the plaintext is encoded by the sender. The receiver reconstructs the plaintext from the ciphertext by decoding. For encoding and decoding so-called keys are used (Koblitz, 1994, p. 55). In the simplest setting, sender and receiver have agreed on a common private key, which is kept secret. This is called symmetric key cryptography. The secret private key is utilized for encoding and decoding messages sent between the two parties. For encoding the plaintext is XOR-ed with the secret key. The decoding is done in the same way using the ciphertext and the secret key on the receiver’s side (Menezes et al., 1996, p. 15). To be specific, if for example the plaintext message is given by the bit string 10011101 and the secret key is 11011100, the ciphertext is then given by 01000001. By using XOR-operations with ciphertext and key once more the plaintext is returned. Note that the XOR operation between two bit is defined as follows: 0 + 0 = 1 + 1 = 0, 1 + 0 = 0 + 1 = 1. If key length and length of plaintext do not coincide, the plaintext may be blocked. This leads to the concept of block ciphers (Menezes et al., 1996, p. 223). Symmetric key techniques generally can be implemented very efficiently. The corresponding algorithms are very fast. The problem, however, lies in the fact that two parties must have agreed on a common key before they can start to communicate and exchange messages. This would be highly impractical, for example, for transactions in electronic commerce (Menezes et al., 1996, p. 31).
منابع مشابه
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...
متن کاملComparison of two Public Key Cryptosystems
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملSelf-Generated-Certificate Based Cryptographic Protocol with Lite Certificate Management
In spite of the vital role played by Digital Certificates in Public Key Cryptographic systems, the overhead involved in maintaining those made them prohibitory. Certificateless Public Key Cryptography [1] was proposed as an alternative. It was based on based on the concept of implicit certification. Even though Certificateless Public Key Cryptography (CLPKC) combines the appealing features of P...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004