Security Analysis of an Improved MFE Public Key Cryptosystem

Author(s):  
Xuyun Nie ◽  
Zhaohu Xu ◽  
Li Lu ◽  
Yongjian Liao
2010 ◽  
Vol 20-23 ◽  
pp. 505-511
Author(s):  
Xuan Wu Zhou

Compared with symmetric cryptosystem, asymmetric cryptosystem has much superiority in many application cases. Yet, the computation in a public key cryptosystem is much more complex than symmetric cryptosystem. In the paper, we applied HCC (Hyper-elliptic Curves Cryptosystem) as a typical fast public key cryptosystem into the designing of efficient blind signature scheme and presented an improved blind signature with fast cryptography algorithms. By utilizing probabilistic blinding algorithm, the scheme renders effective protection for the secrecy of original user, the signature generator or outer adversaries can not attack the secret message via the blinded information with effective polynomial algorithms. The scheme avoids the relevance between different signatures and interim parameters from the same original user, thus it effectively prevents signature forgery and replay attack. As security analysis for the scheme, we presented similar blind signature without relevant improving algorithms based on discrete logarithm cryptosystem. The analysis and comparison with other schemes both justify the security, reliability and high efficiency of the improved blind signature scheme regarding software and hardware application environment.


2014 ◽  
Vol 962-965 ◽  
pp. 2814-2817
Author(s):  
Si Min Liu ◽  
Jun Yao Ye

Because the decoding problem of general linear codes is an NPC problem, at the same time Goppa codes have fast decoding algorithm, McEliece first proposed a public-key cryptosystem based on error-correcting codes. This paper constructs the largest distance codes based on metric, then improves the McEliece cryptosystem based on the largest distance codes. We've proved that the cryptosystem is able to resist the attack of getting the private key by a known public key. Finally, through the analysis of existing viable attack method, we proved the feasibility and security of the improved McEliece cryptosystem.


2013 ◽  
Vol 321-324 ◽  
pp. 2669-2673
Author(s):  
Feng Yuan ◽  
Hai Wen Ou ◽  
Sheng Wei Xu

The multivariate public key cryptosystem is a new and fast public key cryptosystem. This paper investigates the security of Square minus scheme, and presents a method to attack the scheme. The attack utilizes the affine parts of the private keys and the weakness caused by the structures of the private keys to find a large number of linear equations. The attack can recover the private keys efficiently when the parameters are small enough.


Fractals ◽  
2014 ◽  
Vol 22 (04) ◽  
pp. 1450011 ◽  
Author(s):  
D. C. MISHRA ◽  
R. K. SHARMA ◽  
MANISH KUMAR ◽  
KULDEEP KUMAR

In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.


Author(s):  
Yasuhiko IKEMATSU ◽  
Dung Hoang DUONG ◽  
Albrecht PETZOLDT ◽  
Tsuyoshi TAKAGI

2011 ◽  
Vol 30 (6) ◽  
pp. 1450-1452 ◽  
Author(s):  
Zheng-tao Jiang ◽  
Jing-liang Zhang ◽  
Yu-min Wang

2021 ◽  
Vol 1897 (1) ◽  
pp. 012045
Author(s):  
Karrar Taher R. Aljamaly ◽  
Ruma Kareem K. Ajeena

Sign in / Sign up

Export Citation Format

Share Document