1,512 research outputs found

    SIGNCRYPTION ANALYZE

    Get PDF
    The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption. The main contribution to this paper represents the implementation of the signcryption algorithm with the examples provided.ElGamal, elliptic curves, encryption, identity-based, proxy-signcryption, public key, ring-signcryption, RSA, signcryption

    The Key Distribution Problem: Prior Advances and Future Challenges

    Get PDF

    New Method in Encryption

    Get PDF
    Encryption in this paper includes the use of  three values which they are the two shadows values of a base value, and the base value is attained from the three shadows values . Encryption  based on two keys was proposed to increase the security of single encryption. We introduce a novel combination of  asymmetric (two public –key) and symmetric ( private-key). Public key and private key  involves odd and even whole values (first shadow value , second shadow value and third shadow value) . shadows values are multiplied making a product value and the value of 1 is subtracted from the produce value, The base value is along with the chosen shadows values ,then we employ  values to find public key to encrypt message and private key to decrypt the encrypted message , as well as introduce new ideal to conclude the private key from the public key in two method ,first method determine the values agreed on some of them between the sender and the recipient . Second raised prime number to different value. Key words: Encryption,  shadows value,  public key, private ke

    Review on DNA Cryptography

    Get PDF
    Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods. In the modern era of e-business and e-commerce the protection of confidentiality, integrity and availability (CIA triad) of stored information as well as of transmitted data is very crucial. DNA molecules, having the capacity to store, process and transmit information, inspires the idea of DNA cryptography. This combination of the chemical characteristics of biological DNA sequences and classical cryptography ensures the non-vulnerable transmission of data. In this paper we have reviewed the present state of art of DNA cryptography.Comment: 31 pages, 12 figures, 6 table
    • …
    corecore