New Cryptosystem Using Multiple Cryptographic Assumptions (Report) New Cryptosystem Using Multiple Cryptographic Assumptions (Report)

New Cryptosystem Using Multiple Cryptographic Assumptions (Report‪)‬

Journal of Computer Science 2011, Dec, 7, 12

    • ‏5٫99 US$
    • ‏5٫99 US$

وصف الناشر

INTRODUCTION Many designated cryptosystems (Diffie and Hellman, 1976) in the literature were developed based on a single cryptographic assumption like algebraic geometric code (Pramod and Manju, 2010), discrete logarithms (DL) (ElGamal, 1985), factorization (FAC) (Rivest et al., 1978), quadratic residue (QR) (Rabin, 1979), elliptic curve discrete logarithm (ECDL) (Koblitz, 1987; Miller, 1986) problems. Some of them remain secure and are resistant to attacks. However, one day in the future, one could find a polynomial algorithm that can efficiently solve the underlying assumption hence break the corresponding cryptosystem easily. Many cryptographers realize it and start to develop a more secure cryptosystem. One of the methods to design such scheme is by using multiple cryptographic assumptions (Ismail et al., 2008a; Elkamchouchi et al., 2004; Harn, 1994; Baocang and Yupu, 2005; Ismail et al., 2008b; Ismail and Hijazi, 2011). The reason behind this is an adversary needs a longer period of time in order to break the multiple cryptographic assumptions-based cryptosystem since it is very unlikely for the adversary to obtain the solutions of these cryptographic assumptions simultaneously.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠١١
١ ديسمبر
اللغة
EN
الإنجليزية
عدد الصفحات
١٠
الناشر
Science Publications
البائع
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
الحجم
١٦٣٫١
ك.ب.
Practical Signcryption Practical Signcryption
٢٠١٠
Provable Security Provable Security
٢٠١٧
Innovative Security Solutions for Information Technology and Communications Innovative Security Solutions for Information Technology and Communications
٢٠١٧
Information Security and Cryptology Information Security and Cryptology
٢٠١٧
Cryptography and Cryptanalysis in Java Cryptography and Cryptanalysis in Java
٢٠٢٢
Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology
٢٠١٧
Analysis of Virus Algorithms (Report) Analysis of Virus Algorithms (Report)
٢٠٠٦
A Fast Approximate String Searching Algorithm. A Fast Approximate String Searching Algorithm.
٢٠٠٥
Management Information Systems Role in Decision-Making During Crises: Case Study (Report) Management Information Systems Role in Decision-Making During Crises: Case Study (Report)
٢٠١٠
A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf) A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf)
٢٠٠٧
Fast Algorithms for Outlier Detection. Fast Algorithms for Outlier Detection.
٢٠٠٨
The Cyber Space and Information, Communication and Technology: A Tool for Westernization Or Orientalism Or both (Report) The Cyber Space and Information, Communication and Technology: A Tool for Westernization Or Orientalism Or both (Report)
٢٠١١