2018
DOI: 10.5815/ijmsc.2018.02.02
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Expository Review of Schmidt-Samoa Cryptosystem

Abstract: Public key cryptographic schemes are vastly used to ensure confidentiality, integrity, authentication and nonrepudiation. Schmidt-Samoa cryptosystem (SSC) is a public key cryptosystem, which depends on the difficulty of large integer factorization problem. The implementation of SSC to secure different recent communication technologies such as cloud and fog computing is on demand due to the assorted security services offered by SSC such as data encryption/decryption, digital signature and data integrity. In thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…AES uses a 128-bit block of plain text data and after encryption, these 128 bits of plain text data get converted into 128 bits of ciphertext. AES algorithm was based on 128-bit block and 128, 192, 256 bits of keys [11,23]. It is also used in TCP/IP protocols such as Secure Sockets Layer (SSL)/Transport Layer Security (TLS) [2].…”
Section: Advanced Encryption Standard (Aes)mentioning
confidence: 99%
“…AES uses a 128-bit block of plain text data and after encryption, these 128 bits of plain text data get converted into 128 bits of ciphertext. AES algorithm was based on 128-bit block and 128, 192, 256 bits of keys [11,23]. It is also used in TCP/IP protocols such as Secure Sockets Layer (SSL)/Transport Layer Security (TLS) [2].…”
Section: Advanced Encryption Standard (Aes)mentioning
confidence: 99%
“…PROPOSED MULTIPLIER DESIGN ALTERNATIVES Fundamentally, multiplication operation (along with fast addition) is a significant unit in almost all cryptographic coprocessors. For instance, in the design of SSC Crypto-processor [15], the multiplication primarily used to compute the square parameter the public key ( and the modulus ( . Also, in the design of RSA Crypto-processor, the multiplier is used to compute the modulus ( and the Euler function [16].…”
Section: IIImentioning
confidence: 99%