2011
DOI: 10.3844/jcssp.2011.1765.1769
|View full text |Cite
|
Sign up to set email alerts
|

New Cryptosystem Using Multiple Cryptographic Assumptions

Abstract: Problem statement:A cryptosystem is a way for a sender and a receiver to communicate digitally by which the sender can send receiver any confidential or private message by first encrypting it using the receiver's public key. Upon receiving the encrypted message, the receiver can confirm the originality of the message's contents using his own secret key. Up to now, most of the existing cryptosystems were developed based on a single cryptographic assumption like factoring, discrete logarithms, quadratic residue … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…The enemy or adversary has to solve the two problems simultaneously which is unlikely to happen in order to read any secret message [6]. Some researchers have developed a new cryptosystem using multiple cryptographic assumptions which offers a greater security level than that schemes based on a single cryptographic assumptions [8]. S. Kumar, Addgarla, and Y. Babji made a comparative security study on symmetric key crptosystem based algorithms such as DES, TDES, IDEA, and AES [9].…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The enemy or adversary has to solve the two problems simultaneously which is unlikely to happen in order to read any secret message [6]. Some researchers have developed a new cryptosystem using multiple cryptographic assumptions which offers a greater security level than that schemes based on a single cryptographic assumptions [8]. S. Kumar, Addgarla, and Y. Babji made a comparative security study on symmetric key crptosystem based algorithms such as DES, TDES, IDEA, and AES [9].…”
Section: Previous Workmentioning
confidence: 99%
“…As the explanation in the encryption phase the characters of each packet are converted to their equivalent ASCII. Then using the 8-bit binary equivalent of the ASCII the first matrix P1 [8,8] is formed for the first packet as shown in Fig.4.1 with the subsequent calculations to encrypt the characters of the packet. In the decryption phase of the algorithm, at first the characters of the received unprintable ciphertext are converted to their equivalent ASCII.…”
Section: Encryptionmentioning
confidence: 99%
“…29 A new fast public key cryptosystem based on two cryptographic assumptions, namely, Diophantine approximation and IFP expected the high level of security of the system. 4 The authors 16,17 have been shown that the multiple cryptographic assumptions offer a greater security level than those schemes based on a single assumption. Therefore, the hybrid mode based cryptosystem provides greater security level while comparing with a single hard problem.…”
Section: Introductionmentioning
confidence: 99%
“…If one day in a near future an attacker solves the hard problem, the underlying system will no longer be secure. Thus to overcome this disadvantage, many designers are proposing cryptosystems based on two hard problems (Baocang and Yupu, 2005;Elkamchouchi et al, 2004;Harn, 1994;Ismail and Hijazi, 2011). If the attacker find a solution to one of these hard problem the system stays secure as the another problem is still hard to solve.…”
Section: Introductionmentioning
confidence: 99%