Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing
|
|
- Jayson Kelley
- 5 years ago
- Views:
Transcription
1 International Journal of Computer Engineering and Applications, Special Edition ISSN Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing Sonu Kumar 1, Megha Sinha 2 1 sonukkumar18@yahoo.com, 2 csemeghs@gmail.com 1,2 Department of Computer Science Engineering, RVSCET, Jamshedpur, India ABSTRACT: Evolution of cloud in the field of Information Technology gaining much popularity in today s world. With the increasing demands on services offered by cloud, security concerns in cloud computing also increased. Thus, to safeguard the data which are delivered to or by cloud we are proposing algorithm to provide security from various attacks. The idea behind to deploy certificates, signature scheme without pairing algorithm to provide an environment where data can be communicated in the secured manner in the cloud with less storage and provide better security than the previous one. This scheme also works with low bandwidth resources. Keywords: Certificateless Public Key Cryptography, Cloud Computing, Elliptic Curve Cryptography, Key Generation Centre (KGC), Digital Signature. 1. INTRODUCTION Cloud has simplified the way of managing things over the Internet. It is an Internet Technology which processes on shared network resources and provides data to computers and other devices on demand. It offers virtual data storage, which is managed by third party enterprise like Google (e.g. Google Drive), Microsoft (Sky Drive) etc. It allows users to use cloud resources without installation on their personal computers. It attracts customers due to its vast service characteristics like on-line storage, platforms, third party integration, offline Sonu Kumar and Megha Sinha 1
2 access, on-line collaboration, utility and application services. It solves the numerous problems of real-time domains like e-governance System, Scientific Research, Decision- Support Systems, Mobile Technology, Web Services and many more. Managing such a big amount of data can only be possible because of the cloud without comprising with efficiency. Since the users' data are stored in the cloud as pay per basis fashion, they got the overwhelmed facility to access data from any device irrespective of their place with the help of internet [1]. When the data are stored in clouds, there may be various security concerns are as follows: 1. Chances of unauthorized access as data are stored at multiple locations in the cloud. 2. In public cloud, chances of counterfeit of confidential data. As the resources of cloud are open to all. 3. Storage and Network sharing too many users gave the chances of access of other users' data. To secure these data various techniques are used in order to maintain data confidentiality and its integrity like encoding/decoding of the message send over the network, use of username and password for authentication purpose and preparing the authorization list who will be allowed to access those data. Even having login id and password is not sufficient to secure shared data in cloud which might be gained access by an intruder. 1.1 EXISTING TECHNOLOGY From the late 1977, DES algorithm has been implemented in cloud by the National Institute of Standards and Technology (NIST) to secure the user s data stored on distributed virtual server through the process of encryption/decryption. Till now onwards various algorithm has been proposed in order to secure the individual or user s data on cloud. To stop the vulnerabilities, hijacking, malicious insiders, etc., still the improvement is going on to secure data in cloud. Recently in 2013, Gharshi R. [2] proposed a system to implement elliptic curve cryptography (ECC) in place of RSA for encryption/decryption of data in the cloud. The idea behind to use ECC over RSA is that it provides a same level of security using smaller key size. Even encrypted data of the smaller size is achieved through ECC. In 2015, Shiralizadeh A. [3] proposed a hybrid encryption algorithm of RSA and SHA-1 hashing Sonu Kumar and Megha Sinha 2
3 techniques for cloud. However, the RSA has very slow key generation speed and combining with a SHA-1 hashing algorithm which have less computational speed make it much slower. Even SHA-1 has security vulnerabilities [4]. Thus, it can t be a fruitful algorithm for encryption of shared data in the cloud. 2. PROPOSED SYSTEM: CERTIFICATELESS SIGNATURE SCHEME WITHOUT PAIRINGS Many of the signature schemes rely on certificates of authenticity of user s identity. And use of the identity-based cryptography increases unnecessary computation, management and also increases the chances of forgery by the Key Generator Centre (KGC). To solve the keyescrow problem Al-Riyami and Paterson [6] proposed the Certificateless Signature Scheme based on elliptic curve cryptography. And we are using elliptic curve cryptography, which is based on public key encryption technique which tends to produce smaller, faster and efficient cryptographic keys. Since it is based on Certificateless Public Key Cryptography, thus there is no need to generate certificates of authenticity and thus using less storage and bandwidth in the process. In this Certificateless Public Key Cryptosystem, user s private key is not generated by the Key Generator Centre alone. It consists of combination of partial secret key generated by the KGC and some secret value generated by the user and thereby eliminates key escrow problem [7]. Another advantage of this algorithm is that its security constraints rely on the elliptic curve discrete logarithm problem to generate keys which is harder to forge rather than generating a large prime number as in the case of RSA algorithm. Algorithm: Let the elliptic curve is denoted as E over finite field F P where p stands for large prime number greater than 3, defined by the equation [8-10]: y 2 = (x 3 + ax + b) mod p and also follows the discriminant equation: Δ = 4a b 2 0. Let G be a cyclic additive group and P, Q belongs to G. Suppose a line containing P and Q and R is the point of intersection of line P and Q, then under the cyclic additive group + R = P + Q. And scalar multiplication over finite field F p can be defined as: Sonu Kumar and Megha Sinha 3
4 tp = P + P + P P (t times) where P belongs to group G. The Certificateless Signature Scheme without pairings consists of seven steps as follows: (I) Setup: The KGC follows certain steps to generate master key and security parameters are as follows: (1) Choose a random generator P over group G having elliptic curve equation, E. (2) KGC selects master private key x and calculates its public key as P pub = x P. (3) KGC chooses two secure hash functions as: H 1 : {0, 1} * G G Zn * and H 2 : {0, 1} * G G G Zn *. (4) KGC publishes public parameters = {E, F p, G, P pub, H 1, H 2 } (II) Set-Secret Value: The user selects its secret key based on identity ID as x ID and computes its public key as P ID =x ID P (III) Partial-Private-Key Generation: In this part, the KGC will create a user s private key for the users from master key and user secret key as follows: (1) KGC chooses r ID ϵ Z * n and determines R ID = r ID P and h ID = H 1 (R ID, P ID, ID). (2) KGC finds the value of s ID = r ID + h ID x mod n and transfers (s ID, R ID ) to the users via secure channel. This partial-private key is only valid, if it satisfies the following conditions: s ID P = R ID + h ID P (IV) Set-Private Key: The user with identical ID will have the pair (x ID, s ID ) as a private key. (V) Set-Public Key: The user with identical ID will have the pair (P ID,R ID ) as a public key. Sonu Kumar and Megha Sinha 4
5 (VI) Sign: On receiving the message m, user s private key pair (x ID, s ID ) and system parameters, it returns the signature of message m by following several steps as follows: (1) Choose the value of l ϵ Z * n at random and finds the value of R = l P. (2) Calculate h = H 2 (m, P ID, R ID, R). (3) Determine whether the equation gcd(l + h, n) == 1. Then go to step 4 otherwise go to step 1. (4) Determine s = (l + h) -1 (x ID + s ID ) mod n. (5) Resulting signature formed is (R, s). (VII) Verify: To verify the correctness of signature for message m, the verifier computes h ID = H 1 (P ID, R ID, ID), h = H 2 (m, ID, R, P ID, R ID ) and then verifies whether, s (R + h P) = P ID + R ID + h ID P pub If it is equal, accept the signature, otherwise reject it. Because Because R = l P, s ID = r ID + h ID x mod n and s = (l + h) -1 (x ID + s ID ) mod n, we have, S (R + h P) = (l + h) -1 (x ID + s ID ) (l P + h P) = (l + h) -1 (x ID + s ID ) (l + h) P = (x ID + s ID ) P = x ID P + s ID P = P ID + R ID + h ID P pub. Thus, the correctness of this scheme is proved. 3. Conclusion: Use of the Certificateless Elliptic Curve Cryptography is the need of today s technology in order to reduce the consumption of power bandwidth, minimum cost, less storage and higher security with the use of smaller key size. This scheme eliminates the need of certificates in key distribution. The Key Escrow problem that occurs in Identity-based cryptography has been solved due to the usage of Partial-Private-Key distribution. Due to use of Partial Private Key concept, no breaching of Private Key is possible and thus increased efficiency and reduces the overall cost in transferring data. For the long term session and low power requirements, Certificateless Signature Scheme would be proved much fruitful and can be deployed with much sustainable security. Sonu Kumar and Megha Sinha 5
6 REFERENCES [1] Srinivasan A., Quadir Mohammad A., Kumar V. (2015), Era of Cloud Computing: A New Insight to Hybrid Cloud, 2 nd Int. Symposium on Big Data and Cloud Computing, pp [2] Gharshi R., Suresha (2013), Enhancing Security in Cloud Storage using ECC Algorithm, Int. J. of Science and Research, Volume 2 Issue 7, pp [3] Shiralizadeh Aysan, Hatamlou Abdulreza, Masdari Md. (2015), Presenting a new data security solution in Cloud Computing, Journal of Scientific Research and Development, pp [4] Boyles Tim, Hashing Algorithms. In: Text Book of CCNA Security. Indiana: Wiley Publishers; 2010, pp [5] Groves M. (2012), Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption, Internet Engineering Task Force. [6] Al-Riyami, Paterson KG (2003), Certificateless public key cryptography, Int. J. of Communication Systems, pp [7] Debiao H., Jianhua C., Rui Z.(2011), Efficient and provable secure certificateless signature scheme without bilinear pairings, Int. J. of Communication Systems. [8] He D., Chen J., Zhang R.(2012), An efficient and provable-secure certificateless signature scheme without pairings, Int. J. of Communication Systems, pp [9] Tian M., Huang L. (2012), Cryptanalysis of a certficateless signature scheme without pairings, Int. J. of Communication Systems. [10] Gong P., Li P. (2012), Further improvement of a Certificateless signature scheme without pairing, Int. J. of Communication Systems. Sonu Kumar and Megha Sinha 6
7 Sonu Kumar and Megha Sinha 7
On the Security of a Certificateless Public-Key Encryption
On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080,
More informationElliptic Curve Public Key Cryptography
Why? Elliptic Curve Public Key Cryptography ECC offers greater security for a given key size. Why? Elliptic Curve Public Key Cryptography ECC offers greater security for a given key size. The smaller key
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationCryptanalysis on Two Certificateless Signature Schemes
Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 4, pp. 586-591 Cryptanalysis on Two Certificateless Signature Schemes F. Zhang, S. Li, S. Miao, Y. Mu,
More informationKey Management and Distribution
CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 10 Key Management; Other Public Key Cryptosystems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan
More informationOn the security of a certificateless signature scheme in the standard model
On the security of a certificateless signature scheme in the standard model Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang State Key Laboratory of Networking and Switch Technology, Beijing University
More informationCryptography and Network Security Chapter 13. Digital Signatures & Authentication Protocols
Cryptography and Network Security Chapter 13 Digital Signatures & Authentication Protocols Digital Signatures have looked at message authentication but does not address issues of lack of trust digital
More informationCryptography and Network Security Chapter 10. Fourth Edition by William Stallings
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Chapter 10 Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture out of the
More informationEfficient password authenticated key agreement using bilinear pairings
Mathematical and Computer Modelling ( ) www.elsevier.com/locate/mcm Efficient password authenticated key agreement using bilinear pairings Wen-Shenq Juang, Wei-Ken Nien Department of Information Management,
More informationComputer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a
More informationComputer Security 3/23/18
s s encrypt a block of plaintext at a time and produce ciphertext Computer Security 08. Cryptography Part II Paul Krzyzanowski DES & AES are two popular block ciphers DES: 64 bit blocks AES: 128 bit blocks
More informationCertificateless Public Key Cryptography
Certificateless Public Key Cryptography Mohsen Toorani Department of Informatics University of Bergen Norsk Kryptoseminar November 9, 2011 1 Public Key Cryptography (PKC) Also known as asymmetric cryptography.
More informationPrime Field over Elliptic Curve Cryptography for Secured Message Transaction
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationPublic Key Algorithms
Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular
More informationUNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Introduction to Cryptography ECE 597XX/697XX
UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 10 Digital Signatures Israel Koren ECE597/697 Koren Part.10.1 Content of this part
More informationThis chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest
1 2 3 This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest PKCS, Diffie- Hellman key exchange. This first published
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 10 Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would
More informationAn Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri and P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur 721 302, India
More informationKey Management and Elliptic Curves
Key Management and Elliptic Curves Key Management Distribution of ublic Keys ublic-key Distribution of Secret Keys Diffie-Hellman Key Echange Elliptic Curves Mathematical foundations Elliptic curves over
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA
More informationDiffie-Hellman. Part 1 Cryptography 136
Diffie-Hellman Part 1 Cryptography 136 Diffie-Hellman Invented by Williamson (GCHQ) and, independently, by D and H (Stanford) A key exchange algorithm o Used to establish a shared symmetric key Not for
More informationCryptographic Systems
CPSC 426/526 Cryptographic Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-10 In lec-10, we learned: - Consistency models - Two-phase commit - Consensus - Paxos Lecture Roadmap
More informationCloud Computing: Security Issues & Solution
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 6 (2017), pp. 1419-1429 Research India Publications http://www.ripublication.com Cloud Computing: Security
More informationUnderstanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography
Understanding Cryptography by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 9 Elliptic Curve Cryptography ver. February 2nd, 2015 These slides were prepared by Tim Güneysu, Christof Paar
More informationEncryption. INST 346, Section 0201 April 3, 2018
Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationStructure-Preserving Certificateless Encryption and Its Application
SESSION ID: CRYP-T06 Structure-Preserving Certificateless Encryption and Its Application Prof. Sherman S. M. Chow Department of Information Engineering Chinese University of Hong Kong, Hong Kong @ShermanChow
More informationCryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings Chapter 13 Digital Signatures To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage
More informationKALASALINGAM UNIVERSITY
KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE
More informationCryptography and Network Security Chapter 13. Fourth Edition by William Stallings. Lecture slides by Lawrie Brown
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 13 Digital Signatures & Authentication Protocols To guard against the baneful influence
More informationA Light-Weight Certificate-Less Public Key Cryptography Scheme Based on ECC
A Light-Weight Certificate-Less Public Key Cryptography Scheme Based on ECC Xuanxia Yao, Xiaoguang Han School of Computer and Communication Engineering University of Science and Technology Beijing (USTB)
More informationDistributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography
More informationRemote User Authentication Scheme in Multi-server Environment using Smart Card
Remote User Authentication Scheme in Multi-server Environment using Smart Card Jitendra Kumar Tyagi A.K. Srivastava Pratap Singh Patwal ABSTRACT In a single server environment, one server is responsible
More informationCryptanalysis of Blind Signature Schemes
IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.5, May 2014 73 Cryptanalysis of Blind Signature Schemes Nitu Singh M.Tech Scholar Dept. of Cmputer Science & Engineering
More informationThe Application of Elliptic Curves Cryptography in Embedded Systems
The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography
More informationInternational Journal of Scientific Research and Reviews
Research article Available online www.ijsrr.org ISSN: 2279 0543 International Journal of Scientific Research and Reviews Asymmetric Digital Signature Algorithm Based on Discrete Logarithm Concept with
More informationThe most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who
1 The most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who exchange messages from any third party. However, it does
More informationSM9 identity-based cryptographic algorithms Part 2: Digital signature algorithm
SM9 identity-based cryptographic algorithms Part 2: Digital signature algorithm Contents 1 Scope... 1 2 Normative references... 1 3 Terms and definitions... 1 3.1 message... 1 3.2 signed message... 1 3.3
More informationTRNG Based Key Generation for Certificateless Signcryption
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationAn Efficient Certificateless Authentication Encryption for WSN Based on Clustering Algorithm
An Efficient Certificateless Authentication Encryption for WSN Based on ing Algorithm Shailendra Singh Gaur Department of I.T. BPIT, GGSIP-University Delhi, India. Orcid Id: 0000000202840447 Dr. A.K. Mohapatra
More informationPublic-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7
Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:
More informationA Mutual Authentication Protocol Which Uses Id for Security from Privileged Insider Attacks
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 Volume 4 Issue 8 ǁ August. 2016 ǁ PP. 68-72 A Mutual Authentication Protocol Which
More informationKey Escrow free Identity-based Cryptosystem
Key Escrow free Manik Lal Das DA-IICT, Gandhinagar, India About DA-IICT and Our Group DA-IICT is a private university, located in capital of Gujarat state in India. DA-IICT offers undergraduate and postgraduate
More informationRobust EC-PAKA Protocol for Wireless Mobile Networks
International Journal of Mathematical Analysis Vol. 8, 2014, no. 51, 2531-2537 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.410298 Robust EC-PAKA Protocol for Wireless Mobile Networks
More informationAn Improved and Efficient RSA Based Certificateless Signature Scheme for Wireless Sensor Networks
An Improved and Efficient RSA Based Certificateless Signature Scheme for Wireless Sensor Networks K. El Marssi The Laboratory for Computer Science and Telecommunications, Université Mohammed V, 4, Avenue
More informationA Two-Fold Authentication Mechanism for Network Security
Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1
More informationKonstantinos Chalkias, George Filiadis, and George Stephanides
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal s Algorithm Konstantinos Chalkias, George Filiadis,
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.5 Public Key Algorithms CSC 474/574 Dr. Peng Ning 1 Public Key Algorithms Public key algorithms covered in this class RSA: encryption and digital signature
More informationThe Modified Scheme is still vulnerable to. the parallel Session Attack
1 The Modified Scheme is still vulnerable to the parallel Session Attack Manoj Kumar Department of Mathematics, Rashtriya Kishan (P.G.) College Shamli- Muzaffarnagar-247776 yamu_balyan@yahoo.co.in Abstract
More informationAuthenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More informationEncryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message
More informationCryptography: More Primitives
Design and Analysis of Algorithms May 8, 2015 Massachusetts Institute of Technology 6.046J/18.410J Profs. Erik Demaine, Srini Devadas and Nancy Lynch Recitation 11 Cryptography: More Primitives 1 Digital
More informationAn efficient and practical solution to secure password-authenticated scheme using smart card
An efficient and practical solution to secure password-authenticated scheme using smart card R. Deepa 1, R. Prabhu M.Tech 2, PG Research scholor 1, Head of the Department 2 Dept.of Information Technology,
More informationSecurity Handshake Pitfalls
Security Handshake Pitfalls Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr 1 Cryptographic Authentication Password authentication is subject to eavesdropping Alternative: Cryptographic challenge-response
More informationCryptanalysis of a Markov Chain Based User Authentication Scheme
Cryptanalysis of a Markov Chain Based User Authentication Scheme Ruhul Amin, G.P. Biswas Indian School of Mines, Dhanbad Department of Computer Science & Engineering Email: amin ruhul@live.com, gpbiswas@gmail.com
More informationPublic Key Algorithms
CSE597B: Special Topics in Network and Systems Security Public Key Cryptography Instructor: Sencun Zhu The Pennsylvania State University Public Key Algorithms Public key algorithms RSA: encryption and
More informationSSH PK Authentication and Auto login configuration for Chassis Management Controller
SSH PK Authentication and Auto login configuration for Chassis Management Controller Dell technical white paper Dell Engineering May 2016 Author: Elangovan G Revisions Date August 2013 May 2016 Description
More informationREMOVE KEY ESCROW FROM THE IDENTITY-BASED ENCRYPTION SYSTEM
REMOVE KEY ESCROW FROM THE IDENTITY-BASED ENCRYPTION SYSTEM Zhaohui Cheng, Richard Comley Luminita Vasiu School of Computing Science, Middlesex University White Hart Lane, London N17 8HR, United Kingdom
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationECC Elliptic Curve Cryptography. Foundations of Cryptography - ECC pp. 1 / 31
ECC Elliptic Curve Cryptography Foundations of Cryptography - ECC pp. 1 / 31 Elliptic Curve an elliptic curve E is a smooth, projective, algebraic curve defined by the following equation: y 2 3 2 a xy
More informationAbhijith Chandrashekar and Dushyant Maheshwary
By Abhijith Chandrashekar and Dushyant Maheshwary Introduction What are Elliptic Curves? Curve with standard form y 2 = x 3 + ax + b a, b ϵ R Characteristics of Elliptic Curve Forms an abelian group Symmetric
More informationLECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)
Department of Software The University of Babylon LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY (One-Way Functions and ElGamal System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationSpring 2010: CS419 Computer Security
Spring 2010: CS419 Computer Security MAC, HMAC, Hash functions and DSA Vinod Ganapathy Lecture 6 Message Authentication message authentication is concerned with: protecting the integrity of a message validating
More informationStudy on data encryption technology in network information security. Jianliang Meng, Tao Wu a
nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric
More informationSecurity Handshake Pitfalls
Cryptographic Authentication Security Handshake Pitfalls Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Password authentication is subject to eavesdropping Alternative: Cryptographic challenge-response
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationCryptanalysis and improvement of passwordauthenticated key agreement for session initiation protocol using smart cards
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2014; 7:2405 2411 Published online 17 January 2014 in Wiley Online Library (wileyonlinelibrary.com)..951 RESEARCH ARTICLE Cryptanalysis and improvement
More informationIssues in Information Systems Volume 18, Issue 2, pp , 2017
IMPLEMENTING ELLIPTIC CURVE CRYPTOGRAPHY USING MICROSOFT EXCEL Abhijit Sen, Kwantlen Polytechnic University, abhijit.sen@kpu.ca ABSTRACT Microsoft Excel offers a number of data manipulation tools that
More informationCHAPTER 4 VERIFIABLE ENCRYPTION OF AN ELLIPTIC CURVE DIGITAL SIGNATURE
68 CHAPTER 4 VERIFIABLE ENCRYPTION OF AN ELLIPTIC CURVE DIGITAL SIGNATURE 4.1 INTRODUCTION This chapter addresses the Verifiable Encryption of Elliptic Curve Digital Signature. The protocol presented is
More informationAnEffectiveAuthenticationSchemeforDistributedMobileCloudComputingServicesusingaSinglePrivateKey
Global Journal of Computer Science and Technology: B Cloud and Distributed Volume 16 Issue 2 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.
More informationUnderstanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography
Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 6 Introduction to Public-Key Cryptography ver. November 18, 2010 These
More informationANALYSIS OF AES ENCRYPTION WITH ECC
ANALYSIS OF AES ENCRYPTION WITH ECC Samiksha Sharma Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Vinay Chopra Department of Computer
More informationAn IBE Scheme to Exchange Authenticated Secret Keys
An IBE Scheme to Exchange Authenticated Secret Keys Waldyr Dias Benits Júnior 1, Routo Terada (Advisor) 1 1 Instituto de Matemática e Estatística Universidade de São Paulo R. do Matão, 1010 Cidade Universitária
More informationData Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II
Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.
More informationElliptic Curve Cryptography and its Application in the Secure Socket Layer/Transport Layer Security Protocol
Elliptic Curve Cryptography and its Application in the Secure Socket Layer/Transport Layer Security Protocol M. Cimi Thomas 1* and S. Sheeja 2 1* Research Scholar, Department of Computer Science, Karpagam
More informationA Novel Identity-based Group Signature Scheme from Bilinear Maps
MM Research Preprints, 250 255 MMRC, AMSS, Academia, Sinica, Beijing No. 22, December 2003 A Novel Identity-based Group Signature Scheme from Bilinear Maps Zuo-Wen Tan, Zhuo-Jun Liu 1) Abstract. We propose
More informationIntroduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption
Introduction to Cryptography and Security Mechanisms: Unit 5 Public-Key Encryption Learning Outcomes Explain the basic principles behind public-key cryptography Recognise the fundamental problems that
More informationPublic Key Cryptography
graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,
More informationContents Digital Signatures Digital Signature Properties Direct Digital Signatures
Contents Digital Signatures... 197 Digital Signature Properties... 198 Direct Digital Signatures... 198 199...قابلداوری Arbitrated Digital Signatures Arbitrated Digital Signature Technaiques... 200 Authentication
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms
Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of
More informationKey Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature
Key Management Digital signatures: classical and public key Classic and Public Key exchange 1 Handwritten Signature Used everyday in a letter, on a check, sign a contract A signature on a signed paper
More informationGrenzen der Kryptographie
Microsoft Research Grenzen der Kryptographie Dieter Gollmann Microsoft Research 1 Summary Crypto does not solve security problems Crypto transforms security problems Typically, the new problems relate
More informationLecture 3.4: Public Key Cryptography IV
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2012 Nitesh Saxena Course Administration HW1 submitted Trouble with BB Trying to check with BB support HW1 solution will be posted very soon
More informationSource Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network
Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,
More informationThe Password Change Phase is Still Insecure
Manoj Kumar: The password change phase change is still insecure 1 The Password Change Phase is Still Insecure Manoj Kumar!"#$ %&''%% E. Mail: yamu_balyan@yahoo.co.in Abstract In 2004, W. C. Ku and S. M.
More informationModule: Cryptographic Protocols. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security
CMPSC443 - Introduction to Computer and Network Security Module: Cryptographic Protocols Professor Patrick McDaniel Spring 2009 1 Key Distribution/Agreement Key Distribution is the process where we assign
More informationGarantía y Seguridad en Sistemas y Redes
Garantía y Seguridad en Sistemas y Redes Tema 2. Cryptographic Tools Esteban Stafford Departamento de Ingeniería Informá2ca y Electrónica Este tema se publica bajo Licencia: Crea2ve Commons BY- NC- SA
More informationAn Enhanced Certificateless Authenticated Key Agreement Protocol
An Enhanced Certificateless Authenticated Key Agreement Protocol Razieh Mokhtarnameh, Sin Ban Ho, Nithiapidary Muthuvelu Faculty of Information Technology, Multimedia University, 63100, Cyberjaya, Malaysia
More informationA SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS
ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2012, Vol.41, No.1 A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS Bae-Ling Chen 1, Wen-Chung Kuo 2*, Lih-Chyau Wuu 3 1
More informationPublic-Key Encryption, Key Exchange, Digital Signatures CMSC 23200/33250, Autumn 2018, Lecture 7
Public-Key Encryption, Key Exchange, Digital Signatures CMSC 23200/33250, Autumn 2018, Lecture 7 David Cash University of Chicago Plan 1. Security of RSA 2. Key Exchange, Diffie-Hellman 3. Begin digital
More informationImplementation of Elliptic Curve Cryptography for Audio Based Application
Implementation of Elliptic Curve Cryptography for Audio Based Application Rahul Singh 1, Ritu Chauhan 2, Vinit Kumar Gunjan 3, Pooja Singh 4 1, 2 Sobhasaria Group of Institution, Sikar, Rajasthan, India
More informationElements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy
Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 2 Due: Friday, 10/28/2016 at 11:55pm PT Will be posted on
More informationCryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL
Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E
More informationEnhanced Authentication Protocol EAP-TTLS using encrypted ECDSA
www.ijcsi.org 173 Enhanced Authentication Protocol EAP-TTLS using encrypted ECDSA Nazanin Bahrami 1, Mohamad Ebrahim Shiri 2, Morteza Salari-Akhgar 3 1 Department of Computer Engineering, Kish Azad University,
More informationSM9 identity-based cryptographic algorithms Part 3: Key exchange protocol
SM9 identity-based cryptographic algorithms Part 3: Key exchange protocol Contents 1 Scope... 1 2 Normative references... 1 3 Terms and definitions... 1 3.1 key exchange... 1 3.2 key agreement... 1 3.3
More informationPYTHIA SERVICE BY VIRGIL SECURITY WHITE PAPER
PYTHIA SERVICE WHITEPAPER BY VIRGIL SECURITY WHITE PAPER May 21, 2018 CONTENTS Introduction 2 How does Pythia solve these problems? 3 Are there any other solutions? 4 What is Pythia? 4 How does it work?
More informationSpring 2010: CS419 Computer Security
Spring 2010: CS419 Computer Security Vinod Ganapathy Lecture 7 Topic: Key exchange protocols Material: Class handout (lecture7_handout.pdf) Chapter 2 in Anderson's book. Today s agenda Key exchange basics
More informationLECTURE 4: Cryptography
CSC 519 Information Security LECTURE 4: Cryptography Dr. Esam A. Alwagait alwagait@ksu.edu.sa Recap form previous Lecture We discussed more symmetric encryption. Books? Security Engineering, Ross Anderson
More information