59 research outputs found

    Signcryption with Matrix Modification of RSA Digital Signature Scheme and Cayley-Purser Algorithm

    Get PDF
    The sender must ensure the security of messages and authenticated messages in messaging communications. Additionally, the sender must guarantee the message's integrity and cannot deny its authenticity or involvement with the message. This aspect is more robust because the recipient can verify, ensuring that the message originates from an authorized sender. In addition to this crucial aspect, the Signcryption method employing the Matrix Modification of RSA Digital Signature Scheme and the Cayley-Purser Algorithm can accomplish both of the objectives of this study. Encrypt-then-sign is the Signcryption method used, and the MD5 hash function performs one-way hashing during the signing procedure to enhance message security. This study tested the message plaintext in the form of a collection of strings consisting of uppercase (capital), lowercase (small), numbers (numeric), and other punctuation characters with varying numbers of characters in each string, as well as the value of modulus n from 10 digits up to its maximum length, which is unconstrained. The test results indicate that the time required for encryption and decryption is proportional to the number of plaintext characters used

    A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.

    Get PDF
    This paper describes a new cryptographic digital signature scheme based on Mandelbrot and Julia fractal sets. Having fractal based digital signature scheme is possible due to the strong connection between the Mandelbrot and Julia fractal sets. The link between the two fractal sets used for the conversion of the private key to the public key. Mandelbrot fractal function takes the chosen private key as the input parameter and generates the corresponding public-key. Julia fractal function then used to sign the message with receiver's public key and verify the received message based on the receiver's private key. The propose scheme was resistant against attacks, utilizes small key size and performs comparatively faster than the existing DSA, RSA digital signature scheme. fractal digital signature scheme was an attractive alternative to the traditional number theory digital signature

    Time stamped Digital Signature Scheme with Message Recovery & Its Application in E-Cash System

    Get PDF
    We propose a Timestamped signature scheme which can be verified universally using signer’s public parameters. A trusted third party, the Timestamping System provides timestamp to a signature without even knowing the content of the document. The proposed scheme can withstand active attacks, such as forgery attack and chosen cipher text attack. It also provides the message recovery feature, i.e., from the timestamped signature, the message can be recovered by the receiver. Hence, the message need not be sent with the signature. The suggested scheme do not require any hash function and there by reduces the verification cost as compared to existing schemes at the expense of marginal increase in signature generation cost. Further, the scheme is more secured as its security lies in solving three computationally hard assumptions Performance analysis of both the schemes has been carried out in details. We applied the Time-stamped signature scheme with Message recovery in Ecash syste

    Development of a certificate less digital signature scheme & implementation in e-cash system

    Get PDF
    Today’s wireless communication systems having limited computational resources and communication bandwidth find certificate less public-key cryptosystems very attractive and vital to their operations in the sense that they help in reducing a significant amount of data load on the network. To eliminate the need of public key digital certificates Shamir proposed ID based cryptosystems in which the user’s identity (e.g. name or email id) is used as the public key. However this method had a major drawback of the key escrow problem as a result of which certificate less digital signature (CDS) came into light. The main idea behind CDS is that there’s a private key generator (PKG) which generates a partial private key for the user .Then using that key and some of its own private information the user computes its actual private key. PKG’s public parameters and the user’s private key together calculate the user’s public key. Harn, Ren and Lin in 2008 proposed a CDS model which consisted of four generic modules namely PKG, user key generation, signature generation and verification. In this paper, we propose an improvement of the aforesaid CDS scheme in terms of time complexity and signature length and implement the new scheme in an e-cash model proposed by Popescu and Oros. Performance analysis of both the schemes has been carried out in details

    A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.

    Get PDF
    Kajian ini mencadangkan primitif baru kekunci-awam berasaskan kepada set Fraktal Mandelbrot dan Julia. Penciptaan kekunci-awam primitif berasas Fraktal boleh dilakukan kerana perkaitan yang kuat di antara set Fraktal Mandelbrot dan set Fraktal Julia. This study proposes new public-key primitives based on Mandelbrot and Julia Fractal sets. The creation of the Fractal based public-key primitives is possible because of the strong connection between the Mandelbrot and Julia Fractal sets

    Analysis of RSA Digital Signature Key Generation using Strong Prime

    Get PDF
    RSA digital signature is a public key algorithm, uses a private key for signing and a public key for verifying. Achieving the efficiency and acceptable level of time for generating strong keys is an important aspect and a key factor of the different security issue that facing the RSA. This paper proposes a new scheme for generating private and public key of the RSA Digital Signature using “Strong prime” concept, state that  , , based on Gordon’s algorithm. In order to optimize the efficiency of key generation time strategy for the prime factorization that relying on such probability
    corecore