An IND-CCA2 Secure Public Key Cryptographic Protocol using Suzuki 2-Group
Autor: | Akshaykumar Meshram, Chandrashekhar Meshram, N. W. Khobragade |
---|---|
Rok vydání: | 2017 |
Předmět: |
Computer science
Key distribution Cryptography 02 engineering and technology Computer security computer.software_genre Encryption Controlled Cryptographic Item Random oracle Public-key cryptography Diffie–Hellman key exchange 030507 speech-language pathology & audiology 03 medical and health sciences Ciphertext 0202 electrical engineering electronic engineering information engineering Cryptosystem Key encapsulation Pre-shared key Security of cryptographic hash functions Key management Key exchange Multidisciplinary Cryptographic primitive business.industry Public key infrastructure Cryptographic protocol Hash-based message authentication code Adaptive chosen-ciphertext attack Public key fingerprint Key (cryptography) Cryptoperiod 020201 artificial intelligence & image processing 0305 other medical science business Cryptographic key types computer |
Zdroj: | Indian Journal of Science and Technology. 10:1-8 |
ISSN: | 0974-5645 0974-6846 |
DOI: | 10.17485/ijst/2017/v10i12/111588 |
Popis: | Objectives: The public key cryptographic protocol is one of the most important fields in computer security. These new public key cryptographic protocols provide high security as compare to past results in the same field. Methods/Statistical Analysis: Public key cryptographic is a protocol of transferring private info and data through open network communication, so only the receiver who has the secret key can read the encrypted messages which might be documents, phone conversations, images or other form of data. To implement privacy simply by encrypting the information intended to remain secret can be achieved by using methods of public key cryptography. Findings: In this study, we propose the new IND-CCA2 secure public key cryptographic protocol using the concept of integral coefficient ring polynomial based on Suzuki 2-group. We demonstrated the security of proposed public key cryptographic protocol in the adaptively chosen cipher text secure (IND-CCA2) in the random oracle model. Application/Improvements: We discussed the new strategy with change over an IND-CPA public key cryptographic protocol into an IND-CCA2 cryptographic protocol. |
Databáze: | OpenAIRE |
Externí odkaz: |