Implementing Signcryption Algorithm
نویسندگان
چکیده
This paper presents what is the signcryption scheme and shows step-by-step the implementation of the signcryption algorithm. In this paper I provide an overview for the research that has been done so far in signcryption area. Here I also discuss about the extensions for the signcryption scheme and the security in signcryption. 2000 Mathematics Subject Classification:54A05, 54B05. Public key cryptography Cryptography word comes from the two ancient Greek words: “krypto”, which means “hidden” and “grafo”, which means “to write”. Cryptography meaning is how to make what you write obscure, unintelligible to everyone except whom you want to communicate with. It is believed that the oldest known text on which cryptography has been applied occurred some 4000 years ago in Egypt. The hieroglyphic inscriptions on a tomb were written with a number of unusual symbols to confuse or obscure the meaning of the inscriptions. Since the oldest times until the 1970s the cryptography was based on symmetric encryption. The data transferred from one system to another over public network can be protected by the method of encryption. On encryption the data is encrypted by any encryption algorithm using the ‘key’. Only the user having the access to the same ‘key’ can decrypt the encrypted data. This method is known as private key or symmetric key cryptography. There are several standard symmetric key algorithms defined: DES, 3DES, AES etc. These standard symmetric algorithms defined are proven to be highly secured and time tested. But the problem with these algorithms is the key exchange. The communicating parties require a shared secret, ‘key’, to be exchanged between them to
منابع مشابه
Signcryption Approaches for Network Security
Signcryption is a new public key cryptography approach to combine digital signature and encryption functionalities as a consequence of the growing consumer demand for information security. The necessity to achieve confidentiality, integrity, authenticity and non-repudiation properties in data communication that motivates new demands for signcryption schemes. The framework of signcryption involv...
متن کاملSigncryption scheme based on schnorr digital signature
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based o...
متن کاملSigncryption Saves Computational and Communicational Costs
The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption and the practical application of signcryption in real life. Because the elliptic curve cryptography became the newest and most efficient method for public key cryptography, i...
متن کاملAn Efficient Scheme for Sensitive Message Transmission using Blind Signcryption
Y. Zheng introduced a new cryptographic primitive Signcryption in [12], which combines digital signature function with a symmetric key encryption algorithm. A digital signature is used for authentication of message and an encryption scheme is used for the confidentiality of messages. A signcryption offers these two properties at the same time and more efficiently. Computational cost in Signcryp...
متن کاملIdentity Based Generalized Signcryption Scheme in the Standard Model
Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is more suitable for the storage constrained setting. In this paper, motivated by Paterson–Schuldt’s scheme, based on bilinear pairing, we first proposed an identity based generalized signcryption (IDGSC) scheme in the standard model. To the best of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011