Scalable Cryptography
نویسندگان
چکیده
Abstract In our modern digital society, cryptography is vital to protect the secrecy and integrity of transmitted stored information. Settings like commerce, electronic banking, or simply private email communication already rely on encryption signature schemes. However, today’s cryptographic schemes do not scale well, thus are suited for increasingly large sets data they used on. For instance, security guarantees currently known RSA encryption—one most commonly type public-key scheme—degrade linearly in number users ciphertexts. Hence, larger settings (such as cloud computing, scenario encrypting all existing traffic) may enable new more efficient attacks. To maintain a reasonable level scenarios, keylengths must be chosen significantly larger, scheme becomes very inefficient. Besides, switch requires an update whole public key infrastructure, impossibility truly scenarios. Even worse, when grows beyond initially anticipated size, we lose guarantees. This problematic motivation project “Scalable Cryptography”, which aims at offering toolbox that suitable huge data. this overview, summarize approach, main findings project. We give it possible indeed provide scalable building blocks. survey work construction (a central block helps secure communication), but also briefly mention other such “reconfigurable cryptography”. first results quantum-resistant cryptography, i.e., remain even presence quantum computer.
منابع مشابه
Secure Antnet Routing Algorithm for Scalable Adhoc Networks Using Elliptic Curve Cryptography
The secure end-to-end route discovery in the decentralized Mobile Adhoc Networks (MANETs) should have to meet the requirements of prevention of DoS attacks on data traffic, should be adaptive and fault tolerant and must have high speed, low energy overhead and scalability for future development. In this research a secure routing using antnet mechanism and mutual authentication using Elliptic Cu...
متن کاملMoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are susceptible to a wide range of malicious attacks, which has stimulated a body of research on “light-weight” security protocols and cryptographic primitives that are suitable for resource-restricted sensor nodes. In this paper we introduce MoTE-ECC, a highly optimized yet scalable ECC library for Memsic’s MICAz motes and other sensor nodes equipped with an 8-b...
متن کاملKleptography: Using Cryptography Against Cryptography
The notion of a Secretly Embedded Trapdoor with Universal Protection (SETUP) has been recently introduced. In this paper we extend the study of stealing information securely and subliminally from black-box cryptosystems. The SETUP mechanisms presented here, in contrast with previous ones, leak secret key information without using an explicit subliminal channel. This extends this area of threats...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2022
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-21534-6_9