9 research outputs found

    Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"

    Get PDF
    In a (t, n) proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy singers can sign messages on behalf of the former, but t 1 or less of them cannot do the same thing

    Analysis of RSA based on Quantitating Key Security Strength

    Get PDF
    AbstractRSA is an asymmetric crypto algorithm which is applied widely in the information security of E-Commerce and Internet-Bank. Its security has been withstanding tests since several decades ago. But the key security isn’t equal to that of algorithm, which is often neglected by most of users and scholars. As to most constructions, they lack definite recognition to the safety of the RSA key. As a result, even some strong crypto-algorithms used it still meets the security predicament. In this paper, start with the known plaintext attack to RSA public key crypto scheme, we pioneer the mechanism of quantitation of the RSA key security strength, the concept of key security coefficient, the evaluation model of security coefficient and the algorithm to extract security strength. Further more, an innovative method of generating secure keys is proposed. After some experimentations, the security performance of key and distribution of secure key-amount, and their key security coefficient are surveyed and analyzed in detail. The theoretic analysis and statistics demonstrate that our mechanism could elevate security of RSA in effect

    Secure Communication with DNS through Cloud

    Get PDF
    Internet in today’s world has become one of the most prominent ways to communicate through text, voice, pictures, video and many more ways. Millions of MB of data is exchanged over internet in a single day all over the world. And lots of those data is sensitive and private. Thus internet provides as point to intrude in someone’s private life or intercept some sensitive data. With the increasing use of Smartphone, a big amount of data is being stored and exchange through the application running on its operating system. This have only increased the data exchange over the network. That’s why the importance of security over the exchange as well as storage of data has increased dramatically over the past few years. For providing security many different methods or ways are taken. Over those methods use of cryptography is one of the widely used methods. DOI: 10.17762/ijritcc2321-8169.15060

    Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

    Get PDF
    In these days there are plenty of signature schemes such as the threshold proxy signature scheme (Kumar and Verma 2010). The network is a shared medium so that the weakness security attacks such as eavesdropping, replay attack, and modification attack. Thus, we have to establish a common key for encrypting/decrypting our communications over an insecure network. In this scheme, a threshold proxy signature scheme based on RSA, any or more proxy signers can cooperatively generate a proxy signature while or fewer of them cannot do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers (Rivest et al., 1978). Comparison is done on the basis of time complexity, space complexity, and communication overhead. We compare the performance of four schemes (Hwang et al. (2003), Kuo and Chen (2005), Yong-Jun et al. (2007), and Li et al. (2007), with the performance of a scheme that has been proposed earlier by the authors of this paper. In the proposed scheme, both the combiner and the secret share holder can verify the correctness of the information that they are receiving from each other. Therefore, the enhanced threshold proxy signature scheme is secure and efficient against notorious conspiracy attacks

    Wireless IP network mobility management: advancing from mobile IP to HIP-based network

    Get PDF
    Wireless networking introduces a whole range of challenges to the traditional TCP/IP network. In particular, IP address the issue of overloading because IP addresses are used as a network locator and an end point identity in the different layers in an OSI model. Even though Mobile IP is widely deployed, it has significant problems relating to performance and security. The Host Identity Protocol (HIP) provides secure mobility management by solving the IP address overloading from another angle. It restructures the TCP/IP model and introduces a new layer and a new namespace. The performance of HIP has proven to be better than Mobile IP and also opens a range of new research opportunities. This dissertation proposes and analyses a new step-stone solution from the Mobile IP-based network into a HIP-based network. The main advantage of this new solution is that much less change is required to the operating system kernel of the end point compared to a full HIP implementation. The new step-stone solution allows Mobile IP to use some HIP features to provide better security and handover performance. This dissertation also proposes several new and novel HIP-based wireless communication network architectures. An HIP-based heterogeneous wireless network architecture and handover scheme has been proposed and analysed. These schemes limit the HIP signalling in the wireless network if no communication to external networks is needed. Beside the network architecture modification, the hybrid Session Initial Protocol (SIP) and HIP-based Voice over IP (VoIP) scheme is proposed and analysed. This novel scheme improves the handover latency and security. This dissertation also proposes and analyses a new and novel extension to HIP, a HIP-based micro-mobility management, micro-HIP (mHIP). mHIP provides a new secure framework for micro-mobility management. It is a more complete HIP-based micro-mobility solution than any other proposed in existing studies. mHIP improves the intra-domain handover performance, the security, and the distribution of load in the intra-domain handover signalling. The new work presented opens up a number of very interesting research opportunities
    corecore