An IND-CCA2 Secure Public Key Cryptographic Protocol using Suzuki 2-Group

Autor: Akshaykumar Meshram, Chandrashekhar Meshram, N. W. Khobragade
Rok vydání: 2017
Předmět:
Computer science
Key distribution
Cryptography
02 engineering and technology
Computer security
computer.software_genre
Encryption
Controlled Cryptographic Item
Random oracle
Public-key cryptography
Diffie–Hellman key exchange
030507 speech-language pathology & audiology
03 medical and health sciences
Ciphertext
0202 electrical engineering
electronic engineering
information engineering

Cryptosystem
Key encapsulation
Pre-shared key
Security of cryptographic hash functions
Key management
Key exchange
Multidisciplinary
Cryptographic primitive
business.industry
Public key infrastructure
Cryptographic protocol
Hash-based message authentication code
Adaptive chosen-ciphertext attack
Public key fingerprint
Key (cryptography)
Cryptoperiod
020201 artificial intelligence & image processing
0305 other medical science
business
Cryptographic key types
computer
Zdroj: Indian Journal of Science and Technology. 10:1-8
ISSN: 0974-5645
0974-6846
DOI: 10.17485/ijst/2017/v10i12/111588
Popis: Objectives: The public key cryptographic protocol is one of the most important fields in computer security. These new public key cryptographic protocols provide high security as compare to past results in the same field. Methods/Statistical Analysis: Public key cryptographic is a protocol of transferring private info and data through open network communication, so only the receiver who has the secret key can read the encrypted messages which might be documents, phone conversations, images or other form of data. To implement privacy simply by encrypting the information intended to remain secret can be achieved by using methods of public key cryptography. Findings: In this study, we propose the new IND-CCA2 secure public key cryptographic protocol using the concept of integral coefficient ring polynomial based on Suzuki 2-group. We demonstrated the security of proposed public key cryptographic protocol in the adaptively chosen cipher text secure (IND-CCA2) in the random oracle model. Application/Improvements: We discussed the new strategy with change over an IND-CPA public key cryptographic protocol into an IND-CCA2 cryptographic protocol.
Databáze: OpenAIRE