Improved Signcryption Algorithm for Information Security in Networks
R. Nishanth, B. Ramakrishnan, and M. Selvi. International Journal of Computer Networks and Applications (IJCNA), 2 (3):
151 - 157(June 2015)
Abstract
In a Cryptographic primordial, the functions of the digital signature and the public key encryption are concurrently carried out. To safely communicate incredibly large messages, the cryptographic primordial known as the signcryption is effectively employed. Though a lion’s share of the public key based mechanism are appropriate for miniature messages, the hybrid encryption (KEM-DEM) offers a proficient and realistic method. In this document, we are cheered to launch an improved signcryption method, which takes cues from the KEM and DEM approaches. The KEM algorithm employs the KDF approach to summarize the symmetric key. The DEM algorithm makes use of the Elliptic curve cryptography technique to encrypt the original message. With an eye on safety aspects, we have testes three attacks and we are cheered to state that the attackers have failed miserably in locating the safety traits of our improved signcryption technique.
%0 Journal Article
%1 nishanth2015improved
%A Nishanth, R. Bhagavath
%A Ramakrishnan, B.
%A Selvi, M.
%D 2015
%J International Journal of Computer Networks and Applications (IJCNA)
%K Cryptographic DEM KDF KEM Signcryption
%N 3
%P 151 - 157
%T Improved Signcryption Algorithm for Information Security in Networks
%U http://www.ijcna.org/Manuscripts/Volume-2/Issue-3/Vol-2-issue-3-M-05.pdf
%V 2
%X In a Cryptographic primordial, the functions of the digital signature and the public key encryption are concurrently carried out. To safely communicate incredibly large messages, the cryptographic primordial known as the signcryption is effectively employed. Though a lion’s share of the public key based mechanism are appropriate for miniature messages, the hybrid encryption (KEM-DEM) offers a proficient and realistic method. In this document, we are cheered to launch an improved signcryption method, which takes cues from the KEM and DEM approaches. The KEM algorithm employs the KDF approach to summarize the symmetric key. The DEM algorithm makes use of the Elliptic curve cryptography technique to encrypt the original message. With an eye on safety aspects, we have testes three attacks and we are cheered to state that the attackers have failed miserably in locating the safety traits of our improved signcryption technique.
@article{nishanth2015improved,
abstract = {In a Cryptographic primordial, the functions of the digital signature and the public key encryption are concurrently carried out. To safely communicate incredibly large messages, the cryptographic primordial known as the signcryption is effectively employed. Though a lion’s share of the public key based mechanism are appropriate for miniature messages, the hybrid encryption (KEM-DEM) offers a proficient and realistic method. In this document, we are cheered to launch an improved signcryption method, which takes cues from the KEM and DEM approaches. The KEM algorithm employs the KDF approach to summarize the symmetric key. The DEM algorithm makes use of the Elliptic curve cryptography technique to encrypt the original message. With an eye on safety aspects, we have testes three attacks and we are cheered to state that the attackers have failed miserably in locating the safety traits of our improved signcryption technique.},
added-at = {2016-11-02T10:10:51.000+0100},
author = {Nishanth, R. Bhagavath and Ramakrishnan, B. and Selvi, M.},
biburl = {https://www.bibsonomy.org/bibtex/2e444c8277fa9c6a35bd2e844c2cd95e0/ijcnaeditor},
interhash = {38f40a2f1e8097bd22ee170b82b66b47},
intrahash = {e444c8277fa9c6a35bd2e844c2cd95e0},
journal = {International Journal of Computer Networks and Applications (IJCNA)},
keywords = {Cryptographic DEM KDF KEM Signcryption},
month = {June},
number = 3,
pages = {151 - 157},
timestamp = {2016-11-02T10:10:51.000+0100},
title = {Improved Signcryption Algorithm for Information Security in Networks},
url = {http://www.ijcna.org/Manuscripts/Volume-2/Issue-3/Vol-2-issue-3-M-05.pdf},
volume = 2,
year = 2015
}