Secure Hybrid Mode-Based Cryptosystem
Problem statement: A cryptosystem provides two parties; a sender and a receiver to communicate interactively via an insecure channel in which, the sender is able to send any confidential message, document or data in a disguised form to the intended receiver. Upon receiving the disguised message, the...
Gespeichert in:
Veröffentlicht in: | American journal of applied sciences 2012, Vol.9 (3), p.289-292 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 292 |
---|---|
container_issue | 3 |
container_start_page | 289 |
container_title | American journal of applied sciences |
container_volume | 9 |
creator | Ismail, E S Baharudin, S |
description | Problem statement: A cryptosystem provides two parties; a sender and a receiver to communicate interactively via an insecure channel in which, the sender is able to send any confidential message, document or data in a disguised form to the intended receiver. Upon receiving the disguised message, the receiver converts it to the intelligible message using his secret key. The security of the existing cryptosystems was based on a single hard problem such as factorization, discrete logarithm, quadratic residue, or elliptic curve discrete logarithm. Although these schemes appear secure, one day in a near future they may be broken if one finds a solution of a single hard problem. Approach: To overcome the disadvantage of using a single hard problem, we developed a secure hybrid mode-based cryptosystem based on the two well-known hard problems; factoring and discrete logarithm. We inject the element of the hard problems into our encrypting and decrypting equations respectively in such a way that the former equation depends on two public keys whereas the latter depends on two corresponding secret keys. Results: The new cryptosystem is shown heuristically secure against various algebraic attacks. The efficiency analysis confirms that our scheme only needs 3T sub( exp)+T sub( hash) time complexity for encryption and 2T sub( exp) time complexity for decryption and this magnitude of complexity is considered minimal for multiple hard problems-like cryptosystems. Conclusion: The newly developed hybrid mode based-cryptosystem provides greater security level than that schemes based on a single hard problem. The enemy or adversary has to solve the two problems simultaneously which is unlikely to happen in order to read any secret message. |
doi_str_mv | 10.3844/ajassp.2012.289.292 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1136440446</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1136440446</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2422-dfb11a0457bc37dfb0f8c51ce508316b72172f1c04eafa0d3cc546c857af5b843</originalsourceid><addsrcrecordid>eNot0E1LxDAQBuAgCq6rv8BLL4KX1Ew--nHUoq6w4kE9hzRNoEtra6Y99N-bUk8zAy_DzEPILbBUFFI-mJNBHFPOgKe8KFNe8jOyA6UkFZmE87WXGS25KC_JFeKJMZHxHHbk7tPZObjksNShbZL3oXH0yaBrkios4zTggpPrr8mFNx26m_-6J98vz1_VgR4_Xt-qxyO1XHJOG18DGCZVXluRx4n5wiqwTrFCQFbnHHLuwTLpjDesEdbGs2yhcuNVXUixJ_fb3jEMv7PDSfctWtd15scNM2qA-I5kUmYxKraoDQNicF6Poe1NWDQwvaLoDUWvKDqi6Igi_gBelFWj</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1136440446</pqid></control><display><type>article</type><title>Secure Hybrid Mode-Based Cryptosystem</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Free Full-Text Journals in Chemistry</source><creator>Ismail, E S ; Baharudin, S</creator><creatorcontrib>Ismail, E S ; Baharudin, S</creatorcontrib><description>Problem statement: A cryptosystem provides two parties; a sender and a receiver to communicate interactively via an insecure channel in which, the sender is able to send any confidential message, document or data in a disguised form to the intended receiver. Upon receiving the disguised message, the receiver converts it to the intelligible message using his secret key. The security of the existing cryptosystems was based on a single hard problem such as factorization, discrete logarithm, quadratic residue, or elliptic curve discrete logarithm. Although these schemes appear secure, one day in a near future they may be broken if one finds a solution of a single hard problem. Approach: To overcome the disadvantage of using a single hard problem, we developed a secure hybrid mode-based cryptosystem based on the two well-known hard problems; factoring and discrete logarithm. We inject the element of the hard problems into our encrypting and decrypting equations respectively in such a way that the former equation depends on two public keys whereas the latter depends on two corresponding secret keys. Results: The new cryptosystem is shown heuristically secure against various algebraic attacks. The efficiency analysis confirms that our scheme only needs 3T sub( exp)+T sub( hash) time complexity for encryption and 2T sub( exp) time complexity for decryption and this magnitude of complexity is considered minimal for multiple hard problems-like cryptosystems. Conclusion: The newly developed hybrid mode based-cryptosystem provides greater security level than that schemes based on a single hard problem. The enemy or adversary has to solve the two problems simultaneously which is unlikely to happen in order to read any secret message.</description><identifier>ISSN: 1546-9239</identifier><identifier>EISSN: 1554-3641</identifier><identifier>DOI: 10.3844/ajassp.2012.289.292</identifier><language>eng</language><subject>Complexity ; Hybrid modes ; Keys ; Logarithms ; Mathematical analysis ; Messages ; Receivers ; Security</subject><ispartof>American journal of applied sciences, 2012, Vol.9 (3), p.289-292</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2422-dfb11a0457bc37dfb0f8c51ce508316b72172f1c04eafa0d3cc546c857af5b843</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4024,27923,27924,27925</link.rule.ids></links><search><creatorcontrib>Ismail, E S</creatorcontrib><creatorcontrib>Baharudin, S</creatorcontrib><title>Secure Hybrid Mode-Based Cryptosystem</title><title>American journal of applied sciences</title><description>Problem statement: A cryptosystem provides two parties; a sender and a receiver to communicate interactively via an insecure channel in which, the sender is able to send any confidential message, document or data in a disguised form to the intended receiver. Upon receiving the disguised message, the receiver converts it to the intelligible message using his secret key. The security of the existing cryptosystems was based on a single hard problem such as factorization, discrete logarithm, quadratic residue, or elliptic curve discrete logarithm. Although these schemes appear secure, one day in a near future they may be broken if one finds a solution of a single hard problem. Approach: To overcome the disadvantage of using a single hard problem, we developed a secure hybrid mode-based cryptosystem based on the two well-known hard problems; factoring and discrete logarithm. We inject the element of the hard problems into our encrypting and decrypting equations respectively in such a way that the former equation depends on two public keys whereas the latter depends on two corresponding secret keys. Results: The new cryptosystem is shown heuristically secure against various algebraic attacks. The efficiency analysis confirms that our scheme only needs 3T sub( exp)+T sub( hash) time complexity for encryption and 2T sub( exp) time complexity for decryption and this magnitude of complexity is considered minimal for multiple hard problems-like cryptosystems. Conclusion: The newly developed hybrid mode based-cryptosystem provides greater security level than that schemes based on a single hard problem. The enemy or adversary has to solve the two problems simultaneously which is unlikely to happen in order to read any secret message.</description><subject>Complexity</subject><subject>Hybrid modes</subject><subject>Keys</subject><subject>Logarithms</subject><subject>Mathematical analysis</subject><subject>Messages</subject><subject>Receivers</subject><subject>Security</subject><issn>1546-9239</issn><issn>1554-3641</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNot0E1LxDAQBuAgCq6rv8BLL4KX1Ew--nHUoq6w4kE9hzRNoEtra6Y99N-bUk8zAy_DzEPILbBUFFI-mJNBHFPOgKe8KFNe8jOyA6UkFZmE87WXGS25KC_JFeKJMZHxHHbk7tPZObjksNShbZL3oXH0yaBrkios4zTggpPrr8mFNx26m_-6J98vz1_VgR4_Xt-qxyO1XHJOG18DGCZVXluRx4n5wiqwTrFCQFbnHHLuwTLpjDesEdbGs2yhcuNVXUixJ_fb3jEMv7PDSfctWtd15scNM2qA-I5kUmYxKraoDQNicF6Poe1NWDQwvaLoDUWvKDqi6Igi_gBelFWj</recordid><startdate>2012</startdate><enddate>2012</enddate><creator>Ismail, E S</creator><creator>Baharudin, S</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2012</creationdate><title>Secure Hybrid Mode-Based Cryptosystem</title><author>Ismail, E S ; Baharudin, S</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2422-dfb11a0457bc37dfb0f8c51ce508316b72172f1c04eafa0d3cc546c857af5b843</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Complexity</topic><topic>Hybrid modes</topic><topic>Keys</topic><topic>Logarithms</topic><topic>Mathematical analysis</topic><topic>Messages</topic><topic>Receivers</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Ismail, E S</creatorcontrib><creatorcontrib>Baharudin, S</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>American journal of applied sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ismail, E S</au><au>Baharudin, S</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Hybrid Mode-Based Cryptosystem</atitle><jtitle>American journal of applied sciences</jtitle><date>2012</date><risdate>2012</risdate><volume>9</volume><issue>3</issue><spage>289</spage><epage>292</epage><pages>289-292</pages><issn>1546-9239</issn><eissn>1554-3641</eissn><abstract>Problem statement: A cryptosystem provides two parties; a sender and a receiver to communicate interactively via an insecure channel in which, the sender is able to send any confidential message, document or data in a disguised form to the intended receiver. Upon receiving the disguised message, the receiver converts it to the intelligible message using his secret key. The security of the existing cryptosystems was based on a single hard problem such as factorization, discrete logarithm, quadratic residue, or elliptic curve discrete logarithm. Although these schemes appear secure, one day in a near future they may be broken if one finds a solution of a single hard problem. Approach: To overcome the disadvantage of using a single hard problem, we developed a secure hybrid mode-based cryptosystem based on the two well-known hard problems; factoring and discrete logarithm. We inject the element of the hard problems into our encrypting and decrypting equations respectively in such a way that the former equation depends on two public keys whereas the latter depends on two corresponding secret keys. Results: The new cryptosystem is shown heuristically secure against various algebraic attacks. The efficiency analysis confirms that our scheme only needs 3T sub( exp)+T sub( hash) time complexity for encryption and 2T sub( exp) time complexity for decryption and this magnitude of complexity is considered minimal for multiple hard problems-like cryptosystems. Conclusion: The newly developed hybrid mode based-cryptosystem provides greater security level than that schemes based on a single hard problem. The enemy or adversary has to solve the two problems simultaneously which is unlikely to happen in order to read any secret message.</abstract><doi>10.3844/ajassp.2012.289.292</doi><tpages>4</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1546-9239 |
ispartof | American journal of applied sciences, 2012, Vol.9 (3), p.289-292 |
issn | 1546-9239 1554-3641 |
language | eng |
recordid | cdi_proquest_miscellaneous_1136440446 |
source | EZB-FREE-00999 freely available EZB journals; Free Full-Text Journals in Chemistry |
subjects | Complexity Hybrid modes Keys Logarithms Mathematical analysis Messages Receivers Security |
title | Secure Hybrid Mode-Based Cryptosystem |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T00%3A04%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Hybrid%20Mode-Based%20Cryptosystem&rft.jtitle=American%20journal%20of%20applied%20sciences&rft.au=Ismail,%20E%20S&rft.date=2012&rft.volume=9&rft.issue=3&rft.spage=289&rft.epage=292&rft.pages=289-292&rft.issn=1546-9239&rft.eissn=1554-3641&rft_id=info:doi/10.3844/ajassp.2012.289.292&rft_dat=%3Cproquest_cross%3E1136440446%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1136440446&rft_id=info:pmid/&rfr_iscdi=true |