Premium Essay

Signcryption

In:

Submitted By ashrisen13
Words 833
Pages 4
In 1997 Yuliang Zheng presented a positive answer to the following question: “is it possible to transfer a message of arbitrary length in a secure and authenticated way with an expense less than that required by signature then encryption?”. This was for the first time, since public-key cryptography has been invented, that the question is addressed in literature. He discovered a new cryptographic primitive, called signcryption, which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly smaller than that required by signature then encryption. The proposed cryptographic primitive is more efficient for both types of costs involved: computational cost and communication overhead. The computational cost represents how much computational effort has to be invested by the sender and by the receiver of the message. It is determined by counting the number of dominant operations involved. The communication overhead represents the extra bits which are appended to a message in case of a digital signature or encryption based on public key cryptography.

Encryption and digital signature are two fundamental cryptographic tools that can guarantee the confidentiality, integrity, and non-repudiation. Until signcryption, they have been viewed as important but distinct building blocks of various cryptographic systems. In public key schemes, a traditional method is to digitally sign a message then followed by an encryption, named signature-then-encryption. In many applications, both confidentiality and authenticity are needed together. Such applications include secure Email (S/MIME), secure shell (SSH), and secure web browsing (HTTPS). In order to accomplish these two goals; many cryptographic schemes have been created: Schnorr signature then ElGamal encryption, DSS then ElGamal encryption, RSA

Similar Documents

Free Essay

Asasa

...1) Five different Stream vs Block Stream | Block | * One symbol of plaintext is immediately convert into its symbol in cipher text * E.g. Caesar cipher, Playfair cipher. | * A group of plaintext symbols is converted into its equivalent group of cipher text symbols * E.g. DES, AES. | 2) 4 mod operation in block cipher * In cryptography, a block cipher operates on blocks of fixed length, often 64 or 128 bits. * Because messages may be of any length, and because encrypting the same plaintext under the same key always produces the same output. * Several modes of operation have been invented which allow block ciphers to provide confidentiality for messages of arbitrary length. * The 4 modes of operation are * Electronic Code Book (ECB) * Cipher Block Chaining (CBC) * Output Feedback (OFB) and * Cipher Feedback (CFB) 3) Briefly describe the working of DES * most widely used block cipher in world adopted in 1977 by NBS (now National Institute of Standards and Technology NIST)as Federal Information Processing Standard 46 (FIPS PUB 46) * encrypts 64-bit data using 56-bit key * has widespread use * The algorithm itself is referred to as the Data Encryption Algorithm (DEA) * IBM developed Lucifer cipher by team led by Feistel in late 60’s used 64-bit data blocks with 128-bit key * then redeveloped as a commercial cipher with input from NSA and others * in 1973 NBS issued request for proposals...

Words: 1149 - Pages: 5

Free Essay

Multiservice Smart Cards

...1 INTRODUCTION 1. Introduction The idea of a single smart card to be used for multiple services has been around for years. Instead of using separate access devices for different services, a user can access multiple services from different service providers by a single smart card. For example, a user can use the same smart card to log on to a remote server system, enter a secure building, and perform a financial transaction. This kind of design frees people from carrying many cards, bringing users the great convenience and at the same time saving resources and costs by manufacturing and managing less volume of cards. Therefore, multi-service smart card systems exhibit a high potential for economic and social benefits. Such a system is even more convenient if only one pass- word is used for each card so that users do not need to remember and cope with many passwords. 1.1 MULTISERVICE SMARTCARDS A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card with embedded integrated circuits. With a single card, and a single administration tool, organizations from government, to industry to academic institutions can deliver an array of personalized credit and loyalty-based services to their users, while generating comprehensive reports, and maintaining strict controls on usage. These cards can offer multiple applications such as: * Credit cards : These are the best known payment cards (classic plastic card): * Financial...

Words: 4969 - Pages: 20