Skip to main content
Top

2018 | OriginalPaper | Chapter

A Hash-Based Public Key Cryptosystem

Authors : Qian Yin, Gang Luo

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, a new public key cryptosystem based on hash is proposed. The algorithm uses hash and time-memory trade-off to construct a trap-door one-way function. It can guarantee the security strength equivalent to the same length symmetric encryption algorithm. Meanwhile, our algorithm has a fast encryption speed and reasonable decryption time, which can be applied to message encryption on the occasions of limited resources such as wireless sensor network. Experimental and theoretical analysis proves that under the same encryption strength, our algorithm’s packet length can be much lower than traditional encryption schemes such as RSA, and has an excellent performance in encryption.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Garg, S., Gentry, C., Halevi, S., et al.: Hiding secrets in software: a cryptographic approach to program obfuscation. Commun. ACM 59(5), 113–120 (2016)CrossRef Garg, S., Gentry, C., Halevi, S., et al.: Hiding secrets in software: a cryptographic approach to program obfuscation. Commun. ACM 59(5), 113–120 (2016)CrossRef
2.
go back to reference Nagaraj, S., Raju, G., Srinadth, V.: Data encryption and authetication using public key approach. Procedia Comput. Sci. 48, 126–132 (2015)CrossRef Nagaraj, S., Raju, G., Srinadth, V.: Data encryption and authetication using public key approach. Procedia Comput. Sci. 48, 126–132 (2015)CrossRef
4.
go back to reference Miri, J., Nsiri, B., Bouallegue, R.: Privacy group distance bounding protocol on TH-UWB based NTRU public key cryptosystem. In: 2017 Sixth International Conference on Communications and Networking, Hammamet, pp. 1–7 (2017) Miri, J., Nsiri, B., Bouallegue, R.: Privacy group distance bounding protocol on TH-UWB based NTRU public key cryptosystem. In: 2017 Sixth International Conference on Communications and Networking, Hammamet, pp. 1–7 (2017)
5.
go back to reference Junli, F., Yawen, W., Haibin, S.: An improved energy-efficient routing algorithm in software define wireless sensor network. In: 2017 IEEE International Conference on Signal Processing, Communications and Computing, pp. 1–5. IEEE (2017) Junli, F., Yawen, W., Haibin, S.: An improved energy-efficient routing algorithm in software define wireless sensor network. In: 2017 IEEE International Conference on Signal Processing, Communications and Computing, pp. 1–5. IEEE (2017)
6.
go back to reference Suryadevara, N.K., Mukhopadhyay, S.C., Kelly, S.D.T.: WSN-based smart sensors and actuator for power management in intelligent buildings. IEEE Trans. Mechatron. 20(2), 564–571 (2015)CrossRef Suryadevara, N.K., Mukhopadhyay, S.C., Kelly, S.D.T.: WSN-based smart sensors and actuator for power management in intelligent buildings. IEEE Trans. Mechatron. 20(2), 564–571 (2015)CrossRef
8.
go back to reference Lu, H., Zhu, X., Gan, Z.: A blocked rainbow table time-memory trade-off method. In: 12th Web Information System and Application Conference, Jinan, pp. 324–329 (2015) Lu, H., Zhu, X., Gan, Z.: A blocked rainbow table time-memory trade-off method. In: 12th Web Information System and Application Conference, Jinan, pp. 324–329 (2015)
9.
go back to reference Tian, Y., Gu, D., Gu, H., Ding, N.: Improved cryptanalytic of time-memory trade-off based on rainbow table. In: ICINS 2014, 2014 International Conference on Information and Network Security, Beijing, pp. 97–104 (2014) Tian, Y., Gu, D., Gu, H., Ding, N.: Improved cryptanalytic of time-memory trade-off based on rainbow table. In: ICINS 2014, 2014 International Conference on Information and Network Security, Beijing, pp. 97–104 (2014)
10.
11.
go back to reference Gupta, P., Kumar, S.: A comparative analysis of SHA and MD5 algorithm. Architecture 1, 5 (2014) Gupta, P., Kumar, S.: A comparative analysis of SHA and MD5 algorithm. Architecture 1, 5 (2014)
12.
go back to reference Shah, D.: Digital security using cryptographic message digest algorithm. Int. J. Adv. Res. Comput. Sci. Manag. Stud. 3(10) (2015) Shah, D.: Digital security using cryptographic message digest algorithm. Int. J. Adv. Res. Comput. Sci. Manag. Stud. 3(10) (2015)
13.
go back to reference Lu, Y., Zhai, J., Zhu, R., et al.: Study of wireless authentication center with mixed encryption in WSN. J. Sens. 2016 (2016) Lu, Y., Zhai, J., Zhu, R., et al.: Study of wireless authentication center with mixed encryption in WSN. J. Sens. 2016 (2016)
14.
go back to reference Lee, G.W., Hong, J.: Comparison of perfect table cryptanalytic tradeoff algorithms. Des. Codes Cryptogr. 80(3), 473–523 (2016)MathSciNetCrossRef Lee, G.W., Hong, J.: Comparison of perfect table cryptanalytic tradeoff algorithms. Des. Codes Cryptogr. 80(3), 473–523 (2016)MathSciNetCrossRef
15.
go back to reference Date, W., Note, W.: Archived NIST Technical Series Publication. NIST Special Publication 800-26 (1992) Date, W., Note, W.: Archived NIST Technical Series Publication. NIST Special Publication 800-26 (1992)
Metadata
Title
A Hash-Based Public Key Cryptosystem
Authors
Qian Yin
Gang Luo
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_35

Premium Partner