[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

An efficient mixed mode and paired cipher text cryptographic algorithm for effective key distribution

Published: 01 November 2014 Publication History

Abstract

Widely used asymmetric key or public key systems such as RSA, Rabin system, ElGamal system, and elliptical curve system are based on a single hard mathematical problem such as factoring or discrete logarithm. Even if these algorithms are very secure now, in the future, the situation may change and someone can solve the single hard problem easily. In this work, a new mixed mode cryptographic algorithm based on RSA is designed, which incorporates three hard mathematical problems hidden root problem, discrete logarithms, and factoring to make the algorithm too secure and uses the properties of both symmetric and asymmetric key algorithms. The decryption of the cipher text by the cryptanalysts is very difficult without the knowledge of secret keys, because he or she needs to solve three hard mathematical problems, which is in fact impractical. Copyright © 2012 John Wiley & Sons, Ltd.

References

[1]
Stallings W. Cryptography and Network Security Principles and Practices 4th edn. Prentice-Hall of India private limited: New Delhi, 2008; pp.110001.
[2]
Forouzan BA, Mukhopadhyay P. Cryptography and Network Security 2nd edn. Tata McGraw Hill Education Private Limited: New Delhi.
[3]
Jan CA. Basic Methods of Cryptography. Cambridge University Press: New York.
[4]
ElGamal T. On Computing Logarithms Over Finite Fields. Advances in Cryptography-Crypto'85 Proceedings, Springer-Verlag, 1986; pp.396-402.
[5]
LaMacchia BA, Odlyzko AM. Computation of discrete logarithm in prime fields. Designs, Codes, and Cryptography 1991; Volume 1: pp.46-62.
[6]
Galbraith SD, Paterson KG eds. Pairing 2008. <bookSeriesTitle>LNCS 5209</bookSeriesTitle>, Springer-Verlag: Berlin Heidelberg, 2008; pp.89-99.
[7]
Bach E. Discrete logarithms and factoring. Technical report UCB 84/186. Computer Science Division EECS, University of California, Berkeley, June 1984.
[8]
Karu P, Loikkanen J. Practical comparison of fast public-key cryptosystems. HUT TML 2000, Tik-110.501 Seminar on Network Security, 2000.
[9]
Xie Q. A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems 2012; Volume 25 Issue 1: pp.47-54.
[10]
Yoon E-J, Yoo2 K-Y. Cryptanalysis of a simple three-party password-based key exchange protocol. International Journal of Communication Systems 2011; Volume 24 Issue 4: pp.532-542.
  1. An efficient mixed mode and paired cipher text cryptographic algorithm for effective key distribution

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image International Journal of Communication Systems
        International Journal of Communication Systems  Volume 27, Issue 11
        November 2014
        1060 pages
        ISSN:1074-5351
        EISSN:1099-1131
        Issue’s Table of Contents

        Publisher

        John Wiley and Sons Ltd.

        United Kingdom

        Publication History

        Published: 01 November 2014

        Author Tags

        1. discrete logarithm
        2. factoring problem
        3. hard mathematical problems
        4. hidden root problem
        5. mixed mode cryptography

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 0
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 14 Dec 2024

        Other Metrics

        Citations

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media