Public-key cryptography in functional programming context
نویسنده
چکیده
Cryptography is the science of information and communication security. Up to now, for efficiency reasons cryptographic algorithm has been written in an imperative language. But to get acquaintance with a functional programming language a question arises: functional programming offers some new for secure communication or not? This article investigates this question giving an overview on some cryptography algorithms and presents how the RSA encryption in the functional language Clean can be implemented and how can be measured the efficiency of a certain application. 1 Functional programming Functional programming is based on the lambda-calculus, with its main principle developed in 1930, by Alonzo Church and Stephen Cole Kleene. With lambda-calculus we can define the notion of computable function, and using the rules defined by lambda-calculus we can express and evaluate any computable function. But in the early development stage of computer science the computer calculating mechanisms were based on another calculating model, such as a Turing machine’s. The Turing machine functioning mechanism was described in 1936 by the mathematician Alan Turing, in the same time as lambda calculus. The Turing machine was the base of Neumann’s architecture Computing Classification System 1998: D.1.1 Mathematics Subject Classification 2010: 68N18
منابع مشابه
Implementing Public - Key Cryptography in Haskell ∗
In this paper we describe how the RSA public-key cipher can be implemented in the functional programming language Haskell and we present a complete working implementation. This implementation serves two useful pedagogical purposes: (1) it is a very clear, high-level implementation of RSA that can easily be understood and manipulated by students of cryptography , and (2) it is an excellent examp...
متن کاملEEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...
متن کاملComparison of two Public Key Cryptosystems
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1003.1387 شماره
صفحات -
تاریخ انتشار 2010