OAEP: Optimal Asymmetric Encryption Padding

Author(s):  
David Pointcheval
2014 ◽  
Vol 635-637 ◽  
pp. 1171-1174
Author(s):  
Xin Hua Li

According to the characteristics of the message middleware and JMS specification, this paper introduces several methods to improve the performance of the security of the JMS message middleware. The basic idea is to use two-way digital signature authentication information, and in the process of message transmission, to use negotiated session key and asymmetric encryption technology to encrypt messages. Using this mechanism can effectively protect the safety of the message transmission and storage, and to achieve a smaller time overhead associated with acceptable performance.


2021 ◽  
Vol 235 ◽  
pp. 03020
Author(s):  
Qian Liao ◽  
Mimi Shao

Features like the distributed ledger, consensus mechanism, asymmetric encryption technology, smart contract and Token of blockchain can lower transaction cost, enhance trust between customers and merchants, as well as eliminate false payment and consumer information leakage, problems which are common in current payment of cross-border E-Commerce platform. Based on the analysis of existing scholars, this paper studied two payment models: digital cash payment based on blockchain technology and the application of blockchain in third-party payment platform. Then the paper discussed the mechanism of blockchain in cross-border e-commerce payment platform, and creatively proposed a blockchain cross-border e-commerce payment platform, serving as reference and guidance for further development of blockchain technology in cross-border payment.1


Author(s):  
Олексій Сергійович Вамболь

Asymmetric ciphers are widely used to ensure the confidentiality of data transmission via insecure channels. These cryptosystems allow the interacting parties to create a shared secret key for a symmetric cipher in such a way that an eavesdropper gets no information useful for cryptanalysis. Network security protocols that use asymmetric ciphers include TLS, S/MIME, OpenPGP, Tor, and many others. Some of the asymmetric encryption schemes are homomorphic, that is, that they allow calculations on encrypted data to be performed without preliminary decryption. The aforesaid property makes possible using these cryptosystems not only for symmetric key establishment but also in several areas of application, in particular in secret voting protocols and cloud computing. The matrix-based knapsack cipher is a new additively homomorphic asymmetric encryption scheme, which is based on the properties of isomorphic transformations of the inner direct product of diagonal subgroups of a general linear group over a Galois field. Unlike classic knapsack encryption schemes, the cryptographic strength of this cipher depends on the computational complexity of the multidimensional discrete logarithm problem. Despite some useful properties, further research into the cryptographic strength of the matrix-based knapsack cipher has found serious drawbacks inherent in this cryptographic scheme. In the given paper an improved polynomial-time plaintext-recovery attack on the matrix-based knapsack cipher is proposed. Applying this cryptanalytic method requires only public information and has time complexity O(t1.34), where t denotes the decryption time of the attacked cryptosystem. The aforementioned attack is more productive and easier to implement in software in comparison with the original one. The advantages of the proposed method are due to using in its algorithm the simple and relatively fast matrix trace operation instead of more complex and slower transformations.


2021 ◽  
pp. 143-149
Author(s):  
Le Quang Minh ◽  

Network security is an important problem, which attracts more attention because recent network attacks caused huge consequences such as data lose, reduce network performance and increase routing load. In this article, we show network attack forms in MANET and propose Multiple Signature Authenticate (MSA) mechanism using digital signature based on asymmetric encryption RSA. Moreover, we describe a new security routing protocol named AODV-MSA by integrating MSA into AODV. Using NS2 simulator system, we implement and examine the efficiency of the AODV-MSA protocol with the 32-bit keys.


2015 ◽  
Vol 11 (12) ◽  
pp. 1118-1131
Author(s):  
Edward David Moreno ◽  
Leila C.M. Buarque ◽  
Florêncio Natan ◽  
Gustavo Quirino ◽  
Ricardo Salgueiro

2019 ◽  
Vol 116 ◽  
pp. 32-40 ◽  
Author(s):  
Gaurav Verma ◽  
Meihua Liao ◽  
Dajiang Lu ◽  
Wenqi He ◽  
Xiang Peng ◽  
...  

2014 ◽  
Vol 8 (13) ◽  
pp. 2157-2170
Author(s):  
Qiqi Lai ◽  
Yupu Hu ◽  
Yuan Chen ◽  
Baocang Wang ◽  
Fenghe Wang

Sign in / Sign up

Export Citation Format

Share Document