Open Access
Subscription Access
High Speed Public Key Encryption using Hyperboloid for Work from Home
Subscribe/Renew Journal
The novel cryptosystem was designed to be fast and secure for cloud. Circle was used for encryption. A 3D hyperbola was used for decryption. Mathematical properties were used to ensure that an eavesdropper could not perform side-channel attacks. The number of equations which an eavesdropper had was lesser than the number of unknowns for every block. The cryptosystem could work anywhere from smartwatches to supercomputer. It was designed to be flexible. 3D hyperboloid cryptosystem could work as both stream and block cipher. There was no restriction on key size and block size. Confusion and diffusion were measured as parameters for security. It is a complete encryption type cryptosystem. Performance and security analysis was performed both in terms of hardware and software implementations. Problem of key management, handling and key distribution was solved. Experimental results indicate that the proposed cryptosystem was faster than both symmetric and asymmetric key cryptosystems.
Keywords
ECC, Public key cryptography, Quantum computer, Quantum encryption, RSA.
Subscription
Login to verify subscription
User
Font Size
Information
- R. Hodgson, “Solving the security challenges of IoT with public key cryptography,” Network Security, vol. 2019, no. 1, pp. 17-19, 2019.
- R. Thiyagarajan, and B. M. Priya, “An enhancement of EAACK using P2P ACK and RSA public key cryptography,” Measurement, vol. 136, pp. 116-121, Mar. 2019.
- U. Vazirani, and T. Vidick, “Fully device independent quantum key distribution,” Communications of the ACM, vol. 62, no. 4, pp. 133-133, 2019.
- C. Majenz, C. Schaffner, and J. van Wier, “Non-malleability for quantum public-key encryption,” Quantum Physics, May 2019.
- X.-L. Pang, L.-F. Qiao, K. Sun, Y. Liu, A.-Lin Yang, and X.-M. Jin, “Experimental quantum-enhanced cryptographic remote control,” Scientific Reports, vol. 9, 2019, Art. no. 5809.
- P. S. Goswami, and T. Chakraborty, “Design of a quantum one-way trapdoor function,” Emerging Technology in Modelling and Graphics, Springer, pp. 547-555, Jul. 2019.
- P. Xu, S. He, W. Wang, W. Susilo, and H. Jin, “Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks,” IEEE Transactions on Industrial Informatics, vol. 14, no. 8, 2018.
- D. Basin, C. Cremers, T. H.-J. Kim, A. Perrig, R. Sasse, and P. Szalachowski, “Design, analysis and implementation of ARPKI: An attack-resilient public-key infrastructure,” IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 3, 2018.
- U. Banerjee, A. Pathak, and A. P. Chandrakasan, “An energy-efficient configurable lattice cryptography processor for the quantum-secure internet of things,” IEEE Int. Solid-State Circuits Conf. (ISSCC), 2019.
- Z. Jing, C. Gu, and P. Shi, “Cryptanalysis of a public key cryptosystem based on data complexity under quantum environment,” Int. Conf. Secur. and Privacy New Comput. Environ. (SPNCE), 2019, pp 411-420.
- S. E. Smart, D. I. Schuster, and D. A. Mazziotti, “Experimental data from a quantum computer verifies the generalized Pauli exclusion principle,” Communications Physics, vol. 2, 2019, Art. no. 11.
- X. Xin, Z. Wang, Q. H. Q. Yang, and F. Li, “New public-key quantum signature scheme with quantum one-way function,” International Journal of Theoretical Physics, pp. 1-13, Jul. 2019.
- V. Gheorghiu, and M. Mosca, “Benchmarking the quantum cryptanalysis of symmetric, public-key and hash-based cryptographic schemes,” Quantum Physics, 2019.
- X.-Q. Cai, T.-Y. Wang, C.-Y. Wei, and F. Gao, “Cryptanalysis of multiparty quantum digital signatures", Quantum Information Processing, Vol 18, Aug 2019, Art. No. 252
Abstract Views: 192
PDF Views: 98