Open Access Open Access  Restricted Access Subscription Access

Improved Signcryption Algorithm for Information Security in Networks


Affiliations
1 Velammal Engineering College, Chennai-66, India
2 Department of Computer Science and Research Centre, S.T. Hindu College, Nagercoil, India
3 S.T. Hindu College, Nagercoil, India
 

In a Cryptographic primordial, the functions of the digital signature and the public key encryption are concurrently carried out. To safely communicate incredibly large messages, the cryptographic primordial known as the signcryption is effectively employed. Though a lion's share of the public key based mechanism are appropriate for miniature messages, the hybrid encryption (KEM-DEM) offers a proficient and realistic method. In this document, we are cheered to launch an improved signcryption method, which takes cues from the KEM and DEM approaches. The KEM algorithm employs the KDF approach to summarize the symmetric key. The DEM algorithm makes use of the Elliptic curve cryptography technique to encrypt the original message. With an eye on safety aspects, we have testes three attacks and we are cheered to state that the attackers have failed miserably in locating the safety traits of our improved signcryption technique.

Keywords

Cryptographic, Signcryption, KEM, DEM, KDF.
User
Notifications
Font Size

Abstract Views: 268

PDF Views: 1




  • Improved Signcryption Algorithm for Information Security in Networks

Abstract Views: 268  |  PDF Views: 1

Authors

R. Bhagavath Nishanth
Velammal Engineering College, Chennai-66, India
B. Ramakrishnan
Department of Computer Science and Research Centre, S.T. Hindu College, Nagercoil, India
M. Selvi
S.T. Hindu College, Nagercoil, India

Abstract


In a Cryptographic primordial, the functions of the digital signature and the public key encryption are concurrently carried out. To safely communicate incredibly large messages, the cryptographic primordial known as the signcryption is effectively employed. Though a lion's share of the public key based mechanism are appropriate for miniature messages, the hybrid encryption (KEM-DEM) offers a proficient and realistic method. In this document, we are cheered to launch an improved signcryption method, which takes cues from the KEM and DEM approaches. The KEM algorithm employs the KDF approach to summarize the symmetric key. The DEM algorithm makes use of the Elliptic curve cryptography technique to encrypt the original message. With an eye on safety aspects, we have testes three attacks and we are cheered to state that the attackers have failed miserably in locating the safety traits of our improved signcryption technique.

Keywords


Cryptographic, Signcryption, KEM, DEM, KDF.