Implementing Signcryption Algorithm

نویسندگان

  • Laura Savu
  • L. Savu
چکیده

This paper presents what is the signcryption scheme and shows step-by-step the implementation of the signcryption algorithm. In this paper I provide an overview for the research that has been done so far in signcryption area. Here I also discuss about the extensions for the signcryption scheme and the security in signcryption. 2000 Mathematics Subject Classification:54A05, 54B05. Public key cryptography Cryptography word comes from the two ancient Greek words: “krypto”, which means “hidden” and “grafo”, which means “to write”. Cryptography meaning is how to make what you write obscure, unintelligible to everyone except whom you want to communicate with. It is believed that the oldest known text on which cryptography has been applied occurred some 4000 years ago in Egypt. The hieroglyphic inscriptions on a tomb were written with a number of unusual symbols to confuse or obscure the meaning of the inscriptions. Since the oldest times until the 1970s the cryptography was based on symmetric encryption. The data transferred from one system to another over public network can be protected by the method of encryption. On encryption the data is encrypted by any encryption algorithm using the ‘key’. Only the user having the access to the same ‘key’ can decrypt the encrypted data. This method is known as private key or symmetric key cryptography. There are several standard symmetric key algorithms defined: DES, 3DES, AES etc. These standard symmetric algorithms defined are proven to be highly secured and time tested. But the problem with these algorithms is the key exchange. The communicating parties require a shared secret, ‘key’, to be exchanged between them to

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Signcryption Approaches for Network Security

Signcryption is a new public key cryptography approach to combine digital signature and encryption functionalities as a consequence of the growing consumer demand for information security. The necessity to achieve confidentiality, integrity, authenticity and non-repudiation properties in data communication that motivates new demands for signcryption schemes. The framework of signcryption involv...

متن کامل

Signcryption scheme based on schnorr digital signature

This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based o...

متن کامل

Signcryption Saves Computational and Communicational Costs

The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption and the practical application of signcryption in real life. Because the elliptic curve cryptography became the newest and most efficient method for public key cryptography, i...

متن کامل

An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption

Y. Zheng introduced a new cryptographic primitive Signcryption in [12], which combines digital signature function with a symmetric key encryption algorithm. A digital signature is used for authentication of message and an encryption scheme is used for the confidentiality of messages. A signcryption offers these two properties at the same time and more efficiently. Computational cost in Signcryp...

متن کامل

Identity Based Generalized Signcryption Scheme in the Standard Model

Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is more suitable for the storage constrained setting. In this paper, motivated by Paterson–Schuldt’s scheme, based on bilinear pairing, we first proposed an identity based generalized signcryption (IDGSC) scheme in the standard model. To the best of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011